Cybercriminals continue to refine their tactics, with data theft now dominating ransomware attacks. Meanwhile, business email compromise (BEC) schemes are becoming increasingly significant.

Cybercriminals continue to refine their tactics, with data theft now dominating ransomware attacks. Meanwhile, business email compromise (BEC) schemes are becoming increasingly significant.
The number of new vulnerabilities—Common Vulnerabilities and Exposures (CVE)—is continually increasing. Even IT professionals find it challenging to prioritise these vulnerabilities.
Autonomous pentests from the cloud can be used to identify vulnerabilities.
Critical vulnerabilities are found among others in Exchange Server, SharePoint and Windows. Attackers can remotely inject and execute malicious code.
How mishandling WebSockets can lead to Denial of Services (DoS) and energy theft.
Simulation by SAS and The Fund for Peace reveals a country's vulnerabilities and potential in extreme situations.