Remove 2016 Remove CSO Remove Social Engineering
article thumbnail

North Korean threat actor APT43 pivots back to strategic cyberespionage

CSO Magazine

It was responsible for the 2014 attack against Sony Pictures, the 2016 cyber heist of funds belonging to the central bank of Bangladesh, and the 2017 WannaCry ransomware worm. When it comes to threat actors working for the North Korean government, most people have heard of the Lazarus group (APT38).

article thumbnail

Survey: Alarming Number of IT Professionals Told to Conceal Breaches

SecureWorld News

The top security threat cited by respondents was software vulnerabilities and/or Zero-Days (53%), followed by phishing/social engineering threats (52%) and attacks targeting the supply chain (49%).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Interview with Dr. Arun Vishwanath on the Latest Cybersecurity Attacks

CyberSecurity Insiders

In fact, in March 2016, I wrote a piece in CNN calling for urgent action and offering solutions. The “people problem” is a phrase I heard in many different occasions when I met with IT managers (CISO, CSO, CIOs), many in leading research labs, national security establishments, and such. I presented it at Blackhat in 2016 and 2017.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

— Matthew Green (@matthew_d_green) February 17, 2016. Formerly on the FBI’s Most Wanted list, Kevin Mitnick is a crucial figure in the history of information security, including approaches to social engineering and penetration testing. " — Paul Asadoorian (@securityweekly) June 7, 2016.