The many ways a ransomware attack can hurt your organization

Loss of revenue, brand and reputation damage, employee layoffs and business closures were some of the effects of a ransomware attack, according to Cybereason. vchal, Getty Images/iStockphoto Ransomware attacks can devastate an organization in obvious ways, most notably by preventing it and its customers or users from accessing critical data

0 Comments

Amazon Prime Day scams resurface for 2021

With this year’s Amazon Prime Day set for June 21-22, scammers are already touting “Early Prime Day Deals,” says Bolster. Image: dennizn/Shutterstock Amazon Prime Day represents an opportunity for consumers to find deals and save money on their favorite products. But it’s also a chance for cybercriminals to take advantage

0 Comments

Cyberattacks Are Tailored to Employees … Why Isn’t Security Training?

Consider four factors and behaviors that impact a particular employee’s risk, and how security training should take them into account. Companies are spending significant resources trying to reduce security risk among employees. And they spend billions each year on training, yet major data breaches continue to make headlines, and human

0 Comments

OSINT 101: What is open source intelligence and how is it used?

OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers The cybersecurity industry often gets obsessed with technology: the latest exploits, hacking tools and threat hunting software. In reality, a lot comes down to people. It’s

0 Comments

Mission Critical: What Really Matters in a Cybersecurity Incident

The things you do before and during a cybersecurity incident can make or break the success of your response. As a lawyer who figuratively parachutes into dozens of catastrophic cybersecurity incidents a year, I’ve learned what is truly mission critical during a cybersecurity incident. In leading cyber-emergency responses across industries,

0 Comments

Geek Squad Vishing Attack Bypasses Email Security to Hit 25K Mailboxes

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

Molerats Hackers Return With New Attacks Targeting Middle Eastern Governments

A Middle Eastern advanced persistent threat (APT) group has resurfaced after a two-month hiatus to target government institutions in the Middle East and global government entities associated with geopolitics in the region in a rash of new campaigns observed earlier this month. Sunnyvale-based enterprise security firm Proofpoint attributed the activity

0 Comments

Akamai adds automation and machine learning to protect user accounts, APIs and applications

Edge platform cybersecurity enhancements are intended to increase responsiveness and augment decision-making, the company said. Image: Teera Konakan/Moment/Getty Images Content delivery platform provider Akamai announced Wednesday platform security enhancements intended to increase cybersecurity protections for web applications, APIs and user accounts. Akamai said its machine learning algorithms leverage insights from

0 Comments

Digital convenience leads to lax security habits among users, survey finds

A new IBM global report examining consumer behaviors finds an average of 15 new online accounts were created and 82% are reusing the same credentials some of the time. Screenshot of IBM’s report on Pandemic Security Side Effects. ” data-credit=”Image: IBM”> Screenshot of IBM’s report on Pandemic Security Side Effects.

0 Comments

Ransomware Poll: 80% of Victims Don’t Pay Up

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments