Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Phishing Reigns as the Most Likely and Most Feared Cyber Attack

With over half of organizations being the victim of password-based attacks in the last year, new data sheds light on the risk of phishing attacks and the use of password-based credentials. If you don’t think credentials are a key element in cyber attacks, I refer you back to an article of mine from the middle of last year where 15 billion (with a ‘b’) credentials are on sale on the dark web.

3 Steps Government Policymakers Can Take to Reduce Critical Infrastructure Cyber Attacks

Recent research identifying nearly 100,000 exposed industrial control systems (ICS) around the world should serve as a critical wake-up call to national government policymakers responsible for ensuring national security, public health, and safety within their borders. These systems, fundamental to our critical infrastructure, underpin essential services that sustain modern society… and they should not be publicly exposed on the Internet!

7 ways to protect remote employees from a cyberattack

Working from home (WFH) has brought with it advantages such as flexibility and access to global talent, but it has also introduced new security threats to organizations. The shift to a remote or hybrid workforce has forced companies to adopt more software-as-a-service (SaaS) applications, which has caused almost 40% of companies to lose control of their IT and security environments, according to data from a Cloudflare study.

Ransomware Attacks Rise 85% Compared to the Previous Year

With November demonstrating multiple increases when compared to various previous time periods, new data signals that we may be in for a bumpy ride in 2024. It’s nice when we get to see reports that are published relatively quickly to let us get a sense of where cyberattacks are today versus, say, a quarter or two ago (or even last year!). The NCCGroup’s Cyber Threat Intelligence Report was just published and covers ransomware attacks through November of this year.

2023 Business Impact Report: Small Businesses and Cyberattacks

We live in a highly digitized world, and small businesses and solopreneurs have become prime targets for cybercriminals. The 2023 Business Impact Report, conducted by the Identity Theft Resource Center (ITRC), sheds light on a concerning trend: a sharp rise in cyberattacks on these smaller entities. This annual report reveals that 73% of small business owners and leaders experienced data breaches or cyberattacks in the past year, a significant increase.

Top tips: Wishing you a vishing-free holiday season with 3 ways to avoid vishing attacks

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week we’re looking at three ways you can avoid falling victim to a vishing attack. Huge discounts, massive promotional campaigns, and a cheerful festive spirit—the holiday season is officially in full swing! ‘Tis the season of joy and giving, but it looks like some people may have missed the memo.

Featured Post

What are the top cybersecurity trends to look out for in 2024?

As 2024 fast approaches, organisations are looking back on the past year to try and gain some insight into what the next 12 months could hold. This past year has been particularly interesting in the world of cyber security, with ransomware and data breaches dominating the headlines, the rise to prominence of AI strengthening cybercrime's arsenal, and the shift of focus to cyber resilience causing businesses to question what comes next for the industry.

Cyber Crime Surge: Unmasking Employee Collusion and Modular Attack Chains || Razorthorn Security

In the evolving landscape of cyber threats, a seismic shift has occurred over the last couple of years. Join us in unraveling the intricate web of cyber crime as a service, where operators entice employees into collusion by dangling lucrative financial incentives. This phenomenon has contributed to a staggering rise in organized cyber attacks.

Protecting your SDLC from a supply chain attack

Did you know that nine out of 10 companies detected software supply chain risks in the past 12 months? The increase in the number of dependencies in a supply chain has extended the attack surface for adversaries. It has also caused threat actors to shift their focus from the downstream chain affecting just end users to the upstream chain affecting vendors, customers, and end users alike.