cybercrime
Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises
Cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they …
Five examples of user-centered bank fraud
In today’s digital-first world, banks and financial service companies need to allow their customers to easily manage money online in order to compete. Unfortunately, most …
Ransomware attack leaves Johannesburg residents without electricity
A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While …
Phishing is a billion-dollar global industry, consumers are the main target
Phishing is a growing pain point for individuals, businesses and CSPs, according to Allot. Consumers are the main target of these attacks, and they are calling for better …
Every minute, $2.9 million is lost to cybercrime
Cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion, according to RiskIQ. Top companies pay $25 per minute due to security …
Average data breach cost has risen to $3.92 million
The cost of a data breach has risen 12% over the past 5 years and now costs $3.92 million on average, according to IBM. These rising expenses are representative of the …
Cyberthreats targeting municipalities are on the rise
Through the first half of 2019, a growing number of municipalities across the US were hit with crippling ransomware attacks, while several large companies disclosed data …
More than 2 million cyber incidents in 2018 created $45 billion in losses
The financial impact of ransomware rose by 60%, losses from business email compromise (BEC) doubled, and cryptojacking incidents more than tripled, all despite the fact that …
Threat actors are doing their homework, researchers identify new impersonation techniques
There is an increase in three main areas: spoofed phishing attempts, HTTPS encryption in URL-based attacks, and cloud-based attacks focused on publicly hosted, trusted …
Anatomy of a ransomware attack: How attackers gain access to unstructured data
Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and …
Cybercriminals leverage malicious Office docs, Mac malware, web app exploits
There’s been a 62% increase in overall malware detections in Q1 2019 compared to the previous quarter. A new WatchGuard report also found that cybercriminals are …
Every year, millions of web domains are registered to defraud businesses
The growth of fraudulent domains corresponds to the growth of the overall domain landscape, according to Proofpoint. Between Q1 and Q4 2018, registrations of fraudulent …
Featured news
Resources
Don't miss
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security