The role and responsibilities of CISOs are changing, but is the direction right? We asked Tyler Baker of Bitdefender.
attack
Phishing Trends: It’s No Longer About Malware
The modalities and targets of cyberattackers has changed, warns guest author Lance Spitzner of the SANS Institute.
Money Gone, Data Too
Study: 86 % of German IT and cybersecurity managers have problems with their backup and recovery solutions.
Silicon Valley Bank: Are New Social Engineering Campaigns Looming?
What does the collapse of Silicon Valley Bank mean for cybersecurity? A commentary by Arctic Wolf's Ian McShane.
A New Era in IT Security
eco IT Security Survey 2023: IT experts see an intensification of the cyber threat situation due to the war in Ukraine.
Staff Training Needs in Cyber Security
Employee Security Index (ESI) Benchmark shows it takes an average of three months of training for employees to develop an adequate understanding of cybersecurity.
Ransomware Threatens Companies
Not only companies complain about ransomware attacks, cyber insurers fear further cost increases.
Chinese Hacker Groups Are Active In Europe
APT Activity Report T3 2022 from ESET shows: Groups allied with China have shifted their activities to European countries.
Microsoft Monitors 100 Active Ransomware Groups
They attack their victims with more than 50 ransomware families. The cybercriminals often gain access to networks via phishing. Ransomware-as-a-service contributes to the success of the cyber extortion business model.
An Interview With Chat GPT On AI And Cybersecurity
Chat GPT advises, "Contingency plans should be prepared and employees should be trained to properly respond to an attack."
Brand Phishing Report: Yahoo Is The Most Frequently Imitated Brand
Brand misuse for phishing attacks: Yahoo tops the list, ahead of DHL, Microsoft and Google.
After Hacker Attack: PayPal Reports Loss of Customer Data
Around 35,000 accounts are affected. Unknown persons capture names, addresses and social security numbers, but no financial data. The trigger is a credential stuffing attack.
How Companies Accelerate Detection and Response
After a network intrusion, it usually takes cybercriminals eleven days to capture or encrypt data, warns Wolfgang Kurz of indevis.
Cyber Deception – One of the Most Powerful IT Security Approaches
Cyber-Deception is one of the most effective and powerful approaches the computer security industry has perhaps ever seen.
Europe Faces a New Wave of Cyber Attacks in 2023
Mandiant forecast assumes cyber operations due to energy crisis and Russian war of aggression.
More Online Fraud And Data Loss In Retail
Imperva study shows: Automated threats jeopardize Black Friday and holiday shopping.
Ransomware-as-a-Service Brings Developers Fat Profits
Trend Micro: Ransomware attacks on Linux and embedded systems in double digits.
How High Is My Cyber Risk?
Business decision-makers are unable to assess their digital attack surfaces due to complexity.
Schools And Universities Targeted By Ransomware Attacks
The education sector suffers from the highest data encryption rate and the longest recovery time worldwide.
New Phishing Tactic Imitates International Domain Names
Homograph phishing attacks use similar characters to impersonate another website.