Please turn on your JavaScript for this page to function normally.
bomb
How fast can organizations respond to a cybersecurity crisis?

Immersive Labs launched an analysis of human cyber capabilities. The report analyzed cyber knowledge, skills and judgment from over half a million exercises and simulations …

skull binary
Malicious web application requests skyrocketing, bad actors stealthier than ever before

Radware released report findings which underscore 2021 as the year of the web application attack. Between 2020 and 2021, the number of malicious web application requests …

money
Top threats for the financial sector

The potential financial, operational, and reputational impact of ransomware makes it the top threat facing financial services organizations, according to a report from …

ukraine attacks
War in Ukraine: What type of cyber attacks can we expect next?

The cyber activities related to the ongoing war in Ukraine have run the gamut from wiper malware hitting organizations and the border control in Ukraine, DDoS attacks aimed at …

skull
Mid-market tackling high rate of costly attacks, worsened by complex, siloed defences and staff burnout

Mid-market organizations in the UK suffered significant financial and operational damage as a result of cyberattacks in 2021, and want to see fundamental change to how …

encryption
IT leaders confident in their ability to manage a ransomware attack: They should know better

ExtraHop released findings from a survey on ransomware that sheds light on the discrepancies between how IT decision makers (ITDMs) see their current security practices, and …

ransomware
What is Ransomware Protection as a Service?

Ransomware attacks have devastating consequences for many businesses. Those go beyond the monetary loss tied to ransom-encrypted data, and include disrupted operations, …

ICS
The biggest threat to ICS/OT is a lack of prioritization

A SANS survey reveals that cyber attackers have demonstrated a robust understanding of operational technology (OT) and industrial control system (ICS) engineering and have …

Critical infrastructure
Lack of visibility plaguing ICS environments

Dragos released its report on cyber threats facing industrial organizations, naming the emergence of three new threat groups targeting ICS/OT environments, including two that …

danger
Cybercrime getting more destructive, remote workers in the crosshairs

Fortinet’s threat intelligence from the second half of 2021 reveals an increase in the automation and speed of attacks demonstrating more advanced persistent cybercrime …

email
How prepared are organizations to face email-based ransomware attacks?

Proofpoint released a report which provides an in-depth look at user phishing awareness, vulnerability, and resilience. The report reveals that attackers were more active in …

Cybercriminals seeking more than just ransomware payment

Venafi announced the findings of a global survey of IT decision-makers looking into the use of double and triple extortion as part of ransomware attacks. The data reveals that …

Don't miss

Cybersecurity news