CYBERATTACKS RISING ACROSS THE GLOBE

| April 18, 2018

article image
EVERY REGION. EVERY INDUSTRY. AT EVERY OPPORTUNITY. Worldwide Cyberattacks in 2018. 299% INCREASE IN Ransomware Attacks. 128% INCREASE IN Malware Attacks. 283% INCREASE IN Encrypted Threats. 65% INCREASE IN Intrusion Attempts. Data gathered via the SonicWall Capture Labs Threat Network, which sources information from more than 1 million security sensors in nearly 200 countries and territories.

Spotlight

Nyotron

We Secure Your World. Nyotron is disrupting the entire security paradigm. Acting as your last line of defense, we proactively protect your data and assets from even the most sophisticated cyber-attacks. We help you Detect, Prevent, Analyze and Respond to zero-hour exploits, advanced persistent threats, ransomware, malware and unknown threats of the future. We Close Your Security Gaps. Our threat-agnostic defense finds threats that other endpoint protection solutions cannot detect, letting you secure the data on your endpoints and critical systems. Providing you ultimate defense and complete protection, Nyotron closes your security gaps.

OTHER ARTICLES

Malicious coronavirus map hides AZORult info-stealing malware

Article | March 11, 2020

Cyberattackers continue to seize on the dire need for information surrounding the novel coronavirus. In one of the latest examples, adversaries have created a weaponized coronavirus map app that infects victims with a variant of the information-stealing AZORult malware. The malicious online map, found at www.Corona-Virus-Map[.]com, appears very polished and convincing, showing an image of the world that depicts viral outbreaks with red dots of various sizes, depending on the number of infections. The map appears to offer a tally of confirmed cases, total deaths and total recoveries, by country, and cites Johns Hopkins University’s Center for Systems Science and Engineering as its supposed data source. Malwarebytes issued a warning about the map last week, and Reason Cybersecurity this week has followed up with its own blog post, reporting additional details on the scam, gathered by Reason Labs researcher Shai Alfasi.

Read More

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Article | March 11, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a lack of IT resources can bite many organizations as they move to enable remote strategies. And when workers and students are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge. Threatpost editors wanted to learn more about challenges and best practices from the IT and security professionals on the front lines of this. Please take a few minutes to take the Threatpost poll. The answers will be collected the results will be published in an article later this week.

Read More

Coronavirus and the Cybersecurity Threat Landscape

Article | March 11, 2020

Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions from the coronavirus will hit every organization, no matter how resilient they thought they were. No single event to date has changed the tech threat landscape more than the consequences and impacts developing around the Coronavirus (aka SARS-CoV-2 and the disease CoViD-19). Then there are the business consequences, such as the sudden changes in consumer patterns and steep loss of income. The coronavirus is unmistakably a black swan event. It falls outside of the outliers. It creates a situation that many security professionals are familiar with: The Medusa Effect.

Read More

EMAIL SECURITY CONCEPTS THAT NEED TO BE IN YOUR EMAIL INFOSEC POLICY

Article | March 11, 2020

Compliance requirements have become more complex because of the continual evolution of security threats and vulnerabilities. Many organizations fail to create an extensive security program to cover their challenges. Emails are one of the most susceptible channels for cyber-criminals to operate. This is why every organization must pay keen attention to email security policies in cybersecurity. Because emails are prone to cyberattacks, enterprises and individuals must take critical measures to secure their email accounts against unauthorized access. Malicious actors use phishing to trick recipients into sharing sensitive information, either by impersonating trusted contacts or legitimate business owners. Email is still one of the most vulnerable avenues for hackers and cyber crooks. Here are the critical email security concepts that need inclusion into your information security policy.

Read More

Spotlight

Nyotron

We Secure Your World. Nyotron is disrupting the entire security paradigm. Acting as your last line of defense, we proactively protect your data and assets from even the most sophisticated cyber-attacks. We help you Detect, Prevent, Analyze and Respond to zero-hour exploits, advanced persistent threats, ransomware, malware and unknown threats of the future. We Close Your Security Gaps. Our threat-agnostic defense finds threats that other endpoint protection solutions cannot detect, letting you secure the data on your endpoints and critical systems. Providing you ultimate defense and complete protection, Nyotron closes your security gaps.

Events