How to better protect your organization's most valuable data

How to better protect your organization’s most valuable data

Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire. Keeping up with cybercriminals can be a never-ending…

View More How to better protect your organization’s most valuable data
Your money or your life: Digital extortion scams

Your money or your life: Digital extortion scams

There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams,…

View More Your money or your life: Digital extortion scams
Hackers use free tools in new APT campaign against industrial sector firms

Hackers use free tools in new APT campaign against industrial sector firms

Researchers have recently detected an advanced persistent threat (APT) campaign that targets critical infrastructure equipment manufacturers by using industry-sector-themed spear-phishing emails and a combination of…

View More Hackers use free tools in new APT campaign against industrial sector firms
North Korean State Hackers Target Retired Diplomats And Military Officials

North Korean State Hackers Target Retired Diplomats And Military Officials

In what appears to be the first attack of its kind, a North Korean state-sponsored hacking group has been targeting retired South Korean diplomats, government,…

View More North Korean State Hackers Target Retired Diplomats And Military Officials
Microsoft details the most clever phishing techniques it saw in 2019

Microsoft details the most clever phishing techniques it saw in 2019

Earlier this month, Microsoft released a report on this year’s malware and cyber-security trends. Among the few trends highlighted in the report was that phishing…

View More Microsoft details the most clever phishing techniques it saw in 2019
Extensive hacking operation discovered in Kazakhstan

Extensive hacking operation discovered in Kazakhstan

Chinese cyber-security vendor Qihoo 360 published a report on Friday exposing an extensive hacking operation targeting the country of Kazakhstan. Targets included individuals and organizations…

View More Extensive hacking operation discovered in Kazakhstan
Cybercriminals using Google Analytics to enhance phishing efforts

Cybercriminals using Google Analytics to enhance phishing efforts

A report from security firm Akamai found that hackers were using analytics services to optimize their phishing efforts. Cloud security firm Akamai released a new…

View More Cybercriminals using Google Analytics to enhance phishing efforts
Nearly 60% of businesses suffered a data breach in the past 3 years

Nearly 60% of businesses suffered a data breach in the past 3 years

In the spirit of October being the 16th Annual National Cybersecurity Awareness Month, a recent Bitdefender study outlined the cybersecurity conditions of infosecurity companies across…

View More Nearly 60% of businesses suffered a data breach in the past 3 years
Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording

Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording

At the end of last week, ESET’s security researchers disclosed the discovery of a new strain of malware that takes the trend for sextortion to a new…

View More Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording
Online internet secure payment and network safe communication and banking concept. Person pay in web via computer. Locks and padlocks on diagram.

Why remote workers are an underrated security risk for small businesses

Despite the risk, small businesses are largely unaware of security risks associated with remote employees, according to a Nationwide survey. In a new survey from…

View More Why remote workers are an underrated security risk for small businesses