Cyber criminals go spear phishing, harpoon executives

The email sent to a Snapchat payroll employee on a Friday in February looked authentic enough. It appeared to be an urgent directive from the CEO of the social media company. Eager to please the boss, the recipient provided what the email asked for—some payroll information of Snapchat’s current and former employees.

Spotlight

Triumfant

Triumfant uses granular change detection and patented analytics to discover, analyze and remediate malicious attacks on endpoint computers without prior knowledge of the attack. Because Triumfant requires no prior knowledge such as signatures it is uniquely able to detect the advanced persistent threat, zero day attacks and other malware that evades traditional protections. Triumfant automatically builds contextual, situational, and surgical remediations that remove the attack and all associated collateral damage. Triumfant leverages this same technology to continuously enforce security configurations, effectively reducing the attack surface on every machine, every day.

Other Infographics
news image

Infographic: What’s next in AI-powered cyber response?

Infographic | July 13, 2021

AI has been touted to be a game-changer for cybersecurity. It can analyse threats; rapidly detect anomalies; and filter through the thousands of security alerts organisations receive in a day. Singapore is already planning on using AI to secure its 5G networks. But AI is a resource, not a replacement. It has to be supported by the intuition of well-trained security analysts, automation, and a consolidated view of the organisation’s IT environment. Cybersecurity experts from Tanium break down how AI is speeding up cyber response, and how organisations can make the most of the tech.

Read More
news image

Cybersecurity: main and emerging threats in 2021

Infographic | January 27, 2022

The progress of digital transformation has inevitably led to new cybersecurity threats. Cybercriminals take advantage of the Covid-19 pandemic, in particular by targeting organisations and companies working remotely. Parliament has adopted its position on a new EU directive that reflects how cybersecurity threats have evolved and introduces harmonised measures across the EU, including on the protection of essential sectors.

Read More
news image

2020 SONICWALL CYBER THREAT REPORT

Infographic | February 12, 2020

The boundaries of your digital empire are limitless. What was once a finite and defendable space is now a boundless territory a vast, sprawling footprint of devices, apps, appliances, servers, networks, clouds and users. Explore SonicWall’s exclusive threat intelligence to help you better understand how cybercriminals think and be fully prepared for what

Read More
news image

Help Your Employees Overcome Cybersecurity Fears by Promoting Cyber Awareness

Infographic | January 23, 2020

Increased cyber awareness has never been more important for businesses and consumers, as U.S. data breaches continue to increase at a record pace and are predicted to reach an all-time high of over 1,000 in 2017. This increase seems to have contributed to a growth in consumer concerns, as our recent research revealed that consumers’ worries about identity theft and cybercrime are now on par with other common concerns such as illnesses and car accidents.

Read More
news image

DDoS Mitigation: Pushing Business’ Cybersecurity to New Heights

Infographic | April 17, 2023

DDoS mitigation is paramount for businesses to protect against the growing threat of DDoS attacks. Learn about the ever increasing threat of DDoS attacks, the potential impact on businesses, and mitigation techniques to safeguard against them.

Read More
news image

Navigating the cyber security marketplace

Infographic | January 1, 2020

Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems PUBLISHED Trusted security products and services certified by the National Cyber Security Centre can help reduce vulnerability to cyber attack.

Read More

Spotlight

Triumfant

Triumfant uses granular change detection and patented analytics to discover, analyze and remediate malicious attacks on endpoint computers without prior knowledge of the attack. Because Triumfant requires no prior knowledge such as signatures it is uniquely able to detect the advanced persistent threat, zero day attacks and other malware that evades traditional protections. Triumfant automatically builds contextual, situational, and surgical remediations that remove the attack and all associated collateral damage. Triumfant leverages this same technology to continuously enforce security configurations, effectively reducing the attack surface on every machine, every day.

Events