Tag: attacks

IBM makes open source tookit available to fight software supply chain attacks

The power of software supply chain attacks was amply demonstrated by SolarWinds but two years on some organizations are still vulnerable thanks to the use of source code management (SCM) systems. IBM’s X-Force Red ethical hacking team has been able…

Continue Reading IBM makes open source tookit available to fight software supply chain attacks

The evolution of botnets and DDoS attacks

Distributed Denial of Service (DDoS) attacksĀ have become an ongoing threat for organizations. Using a variety of techniques, a wide range of threat actors from lone hackers, criminal gangs and hacktivists to nation-states are using DDoS attacks to disrupt or disable…

Continue Reading The evolution of botnets and DDoS attacks

Three of the world’s most expensive phishing attacks and how they could have been prevented

A number of high-profile cyber-attacks in 2021 thrust cybersecurity back into the spotlight. In light of the HAFNIUM hack, cybersecurity has become a major focus for many businesses. Although the hack itself was not the result of human error, it…

Continue Reading Three of the world’s most expensive phishing attacks and how they could have been prevented

Microsoft updates Windows 11 to block RDP and other brute force attacks by default

Microsoft has introduced a change to Windows 11 that makes it much harder to use brute force attacks to crack passwords. Starting with the latest Insider builds, there is a new account lockout policy in place by default. The policy…

Continue Reading Microsoft updates Windows 11 to block RDP and other brute force attacks by default

Why ATO attacks are at the top of the list

Digital identity is the new currency, and adversaries are chasing wealth. Research shows that 61 percent of data breaches are the result of compromised credentials. This is a common fraudster tactic, whereby using legitimate credentials allows them to avoid detection…

Continue Reading Why ATO attacks are at the top of the list

Almost half of organizations suffer voice network attacks

A new survey shows that 47 percent of organizations have experienced a vishing (voice phishing) or social engineering attack via their voice networks in the past year. The study by voice traffic protection specialist Mutare also finds most are unaware…

Continue Reading Almost half of organizations suffer voice network attacks

Threat of firmware attacks is a growing concern for business

New research from HP Wolf Security finds that 80 percent of IT leaders are concerned about their capacity to respond to firmware attacks. The study shows that 67 percent of IT leaders say protecting against, detecting, and recovering from firmware…

Continue Reading Threat of firmware attacks is a growing concern for business

Our water supply is of existential importance and needs the best possible protection against cyber attacks

Water is — said without pathos — our elixir of life. After the air we breathe, we depend on nothing more to survive. We are made up of about 70 percent water and can survive only a few days without…

Continue Reading Our water supply is of existential importance and needs the best possible protection against cyber attacks

BEC attacks get more businesslike to trick users

Business email compromise attacks are up 53 percent over the last year and are increasingly trying to look more like legitimate emails in their use of language. A new report from Armorblox shows 74 percent of BEC attacks are using…

Continue Reading BEC attacks get more businesslike to trick users

Identity-based attacks are top threat to businesses

Ransomware, software supply chain attacks, data breaches, and more have become an almost daily occurrence in an increasingly challenging threat landscape. Automated threat detection company Blumira has released a new report based on its security detections which reveals that identity-based…

Continue Reading Identity-based attacks are top threat to businesses