Remove Architecture Remove IoT Remove Social Engineering
article thumbnail

Ghost Ransomware a Persistent Global Threat to Critical Infrastructure

SecureWorld News

Experts warn that organizations must act decisively to protect against this growing threat by implementing Zero Trust architectures, patching vulnerabilities, and strengthening identity security. Persistent exploitation of legacy systems One of the most alarming aspects of Ghost ransomware is its focus on legacy IoT and OT environments.

article thumbnail

State of Cybersecurity in Canada 2025: Key Insights for InfoSec Leaders

SecureWorld News

The State of Cybersecurity in Canada 2025 report, published by the Canadian Cybersecurity Network (CCN) and the Security Architecture Podcast , delivers an in-depth analysis of the evolving threat landscape, emerging risks, and strategic recommendations for Canadian organizations.

InfoSec 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Security Boulevard

driven social engineering: An overview of the rising use of AI in social engineering, from deepfake videos to voice impersonation used to defraud enterprises.Malware campaigns exploiting interest in AI: ThreatLabz investigation into a malware campaign reveals how attackers lure victims with a fake AI platform to deliver the Rhadamanthys infostealer.

article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Social Engineering: Investigate the human element of cybersecurity by exploring social engineering techniques and tactics used to manipulate individuals. Internet of Things (IoT) Security: Examine the security risks associated with IoT devices, including privacy concerns, data integrity, and device authentication.

article thumbnail

Reading the ENISA Threat Landscape Report 2018

Security Affairs

Nation-state hacking reduced the use of complex malware and appears to go towards low profile social engineering attacks. Another element of concern is the diffusion of IoT devices that are poorly protected. “The need for generic IoT protection architectures/good practices will remain pressing.”

article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Cyberattacks and data breaches will continue to arise because of credential theft, social engineering (phishing, smishing, vishing etc), vulnerabilities in third party software and supply chain processes, forged or stolen machine identities, and misconfigured cloud computing. Here are my predictions for 2023. Types of attacks.

article thumbnail

Securing the Supply Chain During Shipping Challenges

CyberSecurity Insiders

Implement Zero-Trust Architecture. Verifying machine identities before enabling access can help secure Internet of Things (IoT) networks, which would otherwise expand supply chains’ attack surfaces. Distracted workers are particularly vulnerable to social engineering attacks, but thorough training can mitigate these risks.