Brand misuse for phishing attacks: Yahoo tops the list, ahead of DHL, Microsoft and Google.

Brand misuse for phishing attacks: Yahoo tops the list, ahead of DHL, Microsoft and Google.
With 2022 drawing to a close, we take a look back at how the technologies that generated the greatest expectations before the start of the year have evolved and some of the events that have taken place this year.
Messages offering last-minute tickets or communicating supposed winnings from a bet are some of the threats detected.
Cyber-Deception is one of the most effective and powerful approaches the computer security industry has perhaps ever seen.
The market is not showing as much interest in 5G as it did at the time of the 4G rollout.
Recent consulting acquisitions enable end-to-end cybersecurity solution for enterprises.
More than one in two Black Friday spam emails involves fraudulent intentions. Spam campaigns with Paypal voucher sweepstakes worth 1000 euros.
Umfrage zeigt, wie unterschiedlich Endnutzer und IT-Entscheider in puncto Datensicherheit ticken – und was daraus für die IT-Security folgt.
Imperva study shows: Automated threats jeopardize Black Friday and holiday shopping.
Da die Zahl der Angriffsvektoren massiv zunimmt, suchen Unternehmen nach neuen Wegen, um ihre Abwehr zu stärken. Schweizer Security-Spezialisten nutzen dies vor allem im Bereich Identity & Access Management (IAM).
ThreatQuotient research reveals that only 18% of organisations are automating alert triage.
According to the British cybersecurity authority, the exact consequences of ransomware attacks have not yet been assessed. In the past twelve months, the authority reports 18 ransomware attacks of national significance.
On average, the amounts are just over $2 million. Regardless of industry, of all the participants in a study, only 8 percent pay amounts greater than $1 million.
State-backed cyber-attacks have become a weapon of political destabilisation and low-intensity warfare. What is the insurance industry's response to this cyber-warfare?
KnowBe4 report on the most clicked phishing emails in Q3 2022.
Cybersecurity industry in the EU still lags behind world leaders, including the U.S. and Israel.
57 percent of IT decision-makers in Germany want to invest EU financial aid in security, according to CyberArk study.
Identity theft, extortion, social polarisation and physical consequences are some of the undesirable consequences that this new world could bring.
Can business even fend off cyberattacks by hostile states? We asked Bogdan "Bob" Botezatu, Director Threat Research & Reporting at Bitdefender, about this.
The cyber extortionists exploit a known vulnerability in a Windows graphics driver. They then manipulate drivers of anti-virus software. This way, the BlackByte group can access systems of its victims undisturbed.
Security specialist BrightCloud has analyzed 95 million endpoints and sensors. Every second one had to deal with at least one infection in the first half of the year.
Out of the box, Windows 11 allows only one failed SMB login attempt every two seconds. Microsoft hopes to reduce Windows' attractiveness to brute-force attacks.
The hacker gained access to vulnerability reports and shared screenshots of internal systems, the email dashboard, and Slack server.
Recent study by Mimecast highlights level of security threats in healthcare.
Auf der IKT-Sicherheitskonferenz 2022 in Wien präsentierte Dreamlab Technologies einen wissenschaftlichen Scan der Cyberlage der Nation.
The group, known as DEV-0270, exploits known vulnerabilities and is not only pursuing political or strategic goals. As an alternative to BitLocker, the group also relies on the open-source tool DiskCryptor.
Sophos Ransomware Report in Retail: 77 percent of retailers have been victims of a ransomware attack.
Samsung's US subsidiary is affected. The unknown perpetrators stole names, addresses and details of registered products. Samsung informs law enforcement and calls in a cybersecurity company.
BlackBerry study: Criminals can access home networks connected to corporate devices.
In his guest article, Yaroslav Rosomakho from Netskope explains how cybercriminals work and how companies can arm themselves against them.