The importance of passwords is often overlooked—until a data breach occurs. In other words, nothing highlights the necessity of a strong password more than the consequences of a weak one. However, most end users are unaware of how vuln ...

The importance of passwords is often overlooked—until a data breach occurs. In other words, nothing highlights the necessity of a strong password more than the consequences of a weak one. However, most end users are unaware of how vuln ...
Between mid-2023 and mid-2024, an average of 309,000 new malware variants were identified daily.
APIs have become an attractive target for cybercriminals, as many companies lack effective monitoring of malicious activities or third-party API integrations.
According to the survey, half of users are not affected. A third are able to fend off attacks. Only 6 percent report operational disruptions.
DDoS attacks have increased in frequency and sophistication since the start of the war between Russia and Ukraine.
Decision-makers see APIs as a Trojan horse for cyber attacks, but most are not investing in the right security applications.
New ransomware groups such as RansomedVC are also responsible for the increase. However, LockBit and Clop continue to be among the major players.
Email phishing tactics are increasingly using HR topics such as dress code changes, training notifications or holiday updates.
Threats in the smart home are due to weak security mechanisms of IoT hardware.
Cybercrime in the healthcare sector is increasing rapidly, posing huge challenges for the industry.
In the EMEA region, 28 percent of infections are due to QSnatch, 21 percent to Ramnit and 19 percent to Emotet.
1,000 attacks per week on organizations - Geopolitical conflicts lead to increased emergence of "disruptive and destructive" malware.
VicOne and TrendMicro join Panasonic and Hitachi Astemo to showcase new security solutions for connected vehicles.
The technical requirements for these attacks are not very high, according to Microsoft. A danger also comes from "pass-the-cookie" attacks.
According to the British cybersecurity authority, the exact consequences of ransomware attacks have not yet been assessed. In the past twelve months, the authority reports 18 ransomware attacks of national significance.
On average, the amounts are just over $2 million. Regardless of industry, of all the participants in a study, only 8 percent pay amounts greater than $1 million.
Out of the box, Windows 11 allows only one failed SMB login attempt every two seconds. Microsoft hopes to reduce Windows' attractiveness to brute-force attacks.
Sophos Ransomware Report in Retail: 77 percent of retailers have been victims of a ransomware attack.
In his guest article, Yaroslav Rosomakho from Netskope explains how cybercriminals work and how companies can arm themselves against them.
Enterprises are being highly targeted with sophisticated DDoS attacks. Critical payloads are being reached faster.
The cyber extortionists are active in the USA and Europe. They demand ransoms in the seven-figure range. When compromising networks, Zeppelin proceeds very carefully.
The top malware strains include remote access Trojans (RATs), banking Trojans, info stealers and ransomware.
Groups LockBit, Hive and BlackCat compromised the network within about two weeks. Apparently, they each use the same hacked RDP connection. Only after the third attack the company approached Sophos for help.
Attractive target for ransomware groups as attacks can be life-threatening and ransom demands are more likely to be paid.
"It's not worth paying", says Reiner Dresbach of Cybereason in his commentary on ransom demands after ransomware attacks.