Attackers are becoming savvier, using search engine optimization (SEO) techniques to bump malicious links and malware to the top of users’ search engine results. Email, SMS, messaging apps, and social media are also commonly used to lure users.
The cyberattack on Colonial Pipeline was a big lesson. It is imperative that critical infrastructure companies uplevel their protection against modern security risks by using modern techniques and automation to comply with new cybersecurity regulations.
U.S. federal agencies issued a joint cybersecurity advisory over cyber threats targeting water facilities and wastewater treatment plants threatening water safety and availability.
Report shows media and entertainment industry are facing a unique set of cyber threats such as using offensive and threatening content, pirating goods and counterfeiting tickets.
There is still an elevated threat of serious Iranian cyber attacks on US targets even as the potential for an all-out war seems to have simmered down for the moment as Iran is known to act through asymmetric warfare.
With the aid of technology, insider fraud has outranked all other forms of fraud for modern businesses, ironically the companies are also using it to pre-emptively stop fraudsters in their tracks.
Despite the potential for visual hacking to take place in public, only 30% of business travelers say that their organizations have educated them on how to protect sensitive information.