Fraudsters send fake invoice, follow up with fake exec confirmation

Fraudsters are trying out a new approach to convince companies to pay bogus invoices: instead of hijacking existing email threads, they are creating convincing ones themselves. A clever payment request fraud The fraud attempt begins with an email conta… Continue reading Fraudsters send fake invoice, follow up with fake exec confirmation

5 free online cybersecurity resources for small businesses

As cyberattacks increase in frequency and sophistication, small and medium-sized businesses (SMBs) become more vulnerable to cyber threats. Unlike larger enterprises, SMBs often lack the financial and technical resources to secure their networks and da… Continue reading 5 free online cybersecurity resources for small businesses

MSPs urged to refine security solutions in response to growing SMB needs

MSPs are focusing on automation and integration between their core tools to improve efficiency, service delivery and cost management, according to Kaseya. Automation, cybersecurity and integration About 90% of respondents hailed automation as a crucial… Continue reading MSPs urged to refine security solutions in response to growing SMB needs

Cyber threats organizations should keep an eye on in 2023

In Malwarebytes’ most recent report on the current state of malware, the company has identified several high-profile cyber threats that organizations should be on the lookout for in 2023. The 5 most important cyber threats LockBit, an affiliate-b… Continue reading Cyber threats organizations should keep an eye on in 2023

Lack of security employees makes SMBs sitting ducks for cyber attacks

For SMBs (and startups in particular), breaches can be devastating, according to DigitalOcean. To strengthen their cybersecurity posture, companies must spend valuable resources on maintaining or updating systems, hiring and training staff, and impleme… Continue reading Lack of security employees makes SMBs sitting ducks for cyber attacks

Balancing security risks and innovation potential of shadow IT teams

Shadow IT teams, also known as rogue IT teams, have grown in popularity in recent years due to the rise of cloud-based apps and remote work. However, this has led to operational tension and security risks within many businesses. 58% of SMBs have experi… Continue reading Balancing security risks and innovation potential of shadow IT teams

The SVB demise is a fraudster’s paradise, so take precautions

For those who haven’t followed the drama, Silicon Valley Bank has been shut down by the California Department of Financial Protection and Innovation, after a bank run that followed an insolvency risk and a stock crash. The Federal Deposit Insurance Cor… Continue reading The SVB demise is a fraudster’s paradise, so take precautions

Business-grade routers compromised in low-key attack campaign

An unknown threat actor has discreetly compromised business-grade DrayTek routers in Europe, Latin and North America, equipping them with a remote access trojan (dubbed HiatusRAT) and a packet capturing program. “The impacted models are high-band… Continue reading Business-grade routers compromised in low-key attack campaign