article thumbnail

Lockbit Ransomware targets England Merseyrail

CyberSecurity Insiders

Merseyrail, an England-based suburban rail network, has confirmed that it has become a victim of a sophisticated cyber attack and an investigation is in progress on this note. Serco and Abellio in a joint venture are operating Merseyrail and were handed over the contract of 25 years in 2003 that expires in 2028.

article thumbnail

WFH and Data Sharing: 6 Ways to Protect Your Systems via Cybersecurity

CyberSecurity Insiders

Moreover, it has been speculated that by 2028, 73% of all departments will have remote workers. According to a recent study by Fundera , 5 million people, nearly 3.6% of the entire US workforce spends half of their productive time by working at home in 2020.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Top Cloud Attacks and How to Protect Against Them

Digital Shadows

With public cloud services spending projected to hit $805 billion in 2024 and double by 2028 , understanding the threats facing cloud environments is critical. Our new report, “Five Ways Cyber Attackers Exploit Cloud Environments,” outlines the most pressing threats to the cloud.

article thumbnail

North Korea-linked APT37 exploited IE zero-day in a recent attack

Security Affairs

The report published by AhnLab includes details on the attack and indicators of compromise (IoCs). APT37 has been active since at least 2012 , it made the headlines in early February 2028, when researchers revealed that the APT group leveraged a zero-day vulnerability in Adobe Flash Player to deliver malware to South Korean users.

Internet 141
article thumbnail

The Cybersecurity Challenge in Mergers and Acquisitions

Digital Shadows

Proactive monitoring helps organizations address security issues early, significantly reducing the risk of successful cyber attacks and ensuring a smoother, more secure integration during M&A. Utilize network segmentation to isolate inherited assets, preventing threats from spreading across the network.