A hacking group with apparent ties to Russia or Belarus has been using "simple yet effective attack techniques and tools" to gain access to multiple governments' email systems as part of apparent cyberespionage operations in support of Russia's invasion of Ukraine, researchers warn.
Cybercriminals have been launching attacks against our people, networks, and services for decades with varying success. So, the need to realign our defences to meet the demands of evolving threats is nothing new.
CISOs have faced a broad and varied set of challenges in recent years. Remote environments, increasingly sophisticated threats and expanding supply chains are just some of the many concerns keeping them up at night.
Threat actors are exploiting the ongoing economic downturn by using job-themed phishing and malware campaigns to target job seekers and employers to steal sensitive information and hack company recruiters. Researchers advise companies to be wary of attachments and URLs.
The Royal ransomware group targeting critical infrastructure in the United States and other countries is made up of experienced ransomware attackers and has strong similarities to Conti, the infamous Russia-linked hacking group, according to a new alert issued by U.S. authorities.
High profile data loss events continue to make front page news, making data protection a top concern for organisations today. Traditional Data Loss Prevention tools were designed to stop well-meaning insiders from accidentally leaking data from an on-premises environment. However, with distributed work forces and...
Cyren plans to cease operations and pursue liquidation after the email security and threat detection vendor failed to sell assets or raise more capital. The company terminated the employment of all remaining workers, commenced a bankruptcy proceeding in Israel and told Nasdaq to delist the company.
As the pandemic abruptly shifted the work landscape, cyber attackers quickly evolved their tactics, which include ransomware, business email compromise, and account takeover attacks. And phishing attacks are persistent. But guess what. So are we.
Proofpoint is a vendor with end-to-end solution. We're confident that...
Cyber criminals are getting bolder and more sophisticated with their threats. As more business assets move to the cloud, attackers have followed close behind. This cloud account compromise threat brief will help you understand:
The anatomy of cloud account takeover
What damage cyber criminals can do with a...
The latest IBM Cost of a Data Breach report highlighted that 19% of total data breaches are due to compromised and stolen credentials, resulting in $4.5 million in losses, and 40% of ransomware attacks start through email. So how do you protect this vital communications channel?
Security leaders have many options...
Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking...
One-out-of-five employees will likely click on a phishing email link. Of those, more than two-thirds (67.5%) will then enter their credentials on the attacker’s website. Making Phishing the most common type of cyber fraud globally.
91% of phishing emails are sent to seduce employees into revealing their passwords...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.