DDoS attacks continue to grow in frequency, intensity and sophistication. However, the delivery method–using infected botnets and vulnerable servers to perform these attacks–remains the same. That said, we are seeing some new attack threats on the horizon in IoT and 5G. Read on to learn more. Where DDoS Attacks Are Originating Although DDoS weapons are […]
The Stock Market Doesn’t React Well to Data Breaches
The latest data from UK-based research firm, Comparitech, shows that organizations who suffer a data breach continue to suffer in the stock market well after. After a data breach, there are many costs incurred by organizations attempting to clean up the mess. Investigations, communications, public relations, legal fees, and customer notifications are just some of […]
Cybersecurity Remains a Top Priority During M&A Diligence
M&A is no longer just about revenue, assets, and intellectual property; many organizations are increasingly worried about cybersecurity posture and risk, requiring appropriate diligence. When organizations merge with or acquire another company, it’s also taking on the cybersecurity posture (good or bad) of that company. In some cases, organizations within an industry filled with regulations […]
Homeland Security Warning About Phishing As A Threat to 2020 Elections
The US Department of Homeland Security is warning state election officials that phishing attacks are one of the greatest threats to watch out for as the 2020 elections approach. Fifth Domain reports that Geoff Hale, director of the DHS’ Election Security Initiative, told a gathering of secretaries of state last week that phishing is what […]
Automated Tailored EBAY Spam Campaign Leads to Risky Sites
Automated spam on eBay is spreading tailored phishing messages offering to promote users’ products, and the links the spammers share can lead to dangerous websites, according to Paul Ducklin at Naked Security. The messages themselves contain text customized to a product the target has just posted, and they include an image of a shortened, easy-to-read […]
Decrypting SSL Traffic: Best Practices for Security, Compliance, and Productivity
Today, encryption has become ubiquitous — Google reports that as of June 1, 2019, 94 percent of traffic across all its products and services is encrypted. Google is not the only company reporting a rise in the use of encryption though; all the commonly used browsers, including Safari and Mozilla, are witnessing the same trend. […]
New NIST Requirements Increase Cyber Security Controls
A new supplement to the National Institute of Standards and Technology (NIST) 800-171 “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations” is on the way. The proposed supplement 800-171B adds 35 new requirements that go alongside the 110 controls in 800-171rev2. Supplement B applies to companies that receive controlled unclassified information (CUI) as part […]
Chinese Hackers Infiltrate Global Telecom Networks With Spear Phishing
The WSJ revealed a brazen hack by Chinese state-sponsored bad actors who totally owned more than 10 global telecom networks, and had full admin access to their networks. They were able to swipe users’ whereabouts, text-messaging records and call logs. They reported: “The multiyear campaign, which is continuing, targeted 20 military officials, dissidents, spies and […]
New KnowBe4 Benchmarking Report Unveils That Untrained Users Pose The Greatest Risk To Your Organization
KnowBe4, has released the new Phishing by Industry Benchmarking Report to measure an organization’s average Phish-prone percentage, which indicates how many of their employees are likely to fall for a phishing or social engineering scam. The 2019 study analyzed a data set of nearly nine million users across 18,000 organizations with over 20 million simulated […]
This Is How Much Time and Money a DDoS Attack Will Cost You
This Is How Much Time and Money a DDoS Attack Will Cost You You don’t have to look at any statistics to know that DDoS attacks aren’t just inconvenient. They can also cost your organization valuable time and money. But just how much time and money? That’s what we’re here to show you with help […]