Remove Cyber Attacks Remove Cyber threats Remove Digital transformation
article thumbnail

Krispy Kreme Cyber Attack a Wake-Up Call for the Food Industry

SecureWorld News

The shift to digital experiences and customer service in industries that were historically only brick-and-mortar underscores how rapid digital transformation expands the attack surface for cybercriminals. All the new points of sale (POS) and customer touchpoints increase the access points that bad actors can exploit.

article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Cyber attackers have used misleading information on social media for procuring campaign finances as well as personal and financial information of people and corporations. My research attempts to bridge the divide between academic research and real-world practice of cyber risk management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Resolutions for 2025

IT Security Guru

As we begin the New Year, it offers a chance for reflection on 2024 and to consider what we can do as security professionals and business leaders in 2025 that will keep us relevant and in the best position to counter cyber threats going forward.

article thumbnail

Cyber Threat forces Canada to shut down 4000 government websites

CyberSecurity Insiders

Can you believe that an unverified cyber threat has forced the Quebec government to shut over 4000 of its websites, all as a preventive measure to avoid extreme cyber troubles? This has happened in practical and was confirmed by Eric Caire, Quebec’s Digital Transformation Minister at a media briefing on Monday.

article thumbnail

These are the 15 Top Cyber Threats Now

SecureWorld News

Sometimes when you are down in the cyber attack trees defending your organization, it can be tough to see the cyber threat forest. Understanding how things are shifting in the forest, or overall threat landscape, can help us categorize, strategize, and prioritize our resources. Cyber Espionage. Ransomware.

article thumbnail

Does That Data Make Your Company a Cyber Attack Target?

CyberSecurity Insiders

The inconvenient truth is that, while most businesses have been distracted by digital transformation (DX), sensitive data has been left on a metaphorical windowsill, like a freshly baked apple pie. The post Does That Data Make Your Company a Cyber Attack Target? Security is For Us, Not Against Us. It’s quite the contrary.

article thumbnail

Russia-Ukraine War: 3 Cyber Threat Effects, 1 Year In

Digital Shadows

State-Backed Tactics Above the Battlefield During the weeks preceding the official invasion of Ukraine, the ReliaQuest Photon Research team observed foreboding signs—among them, military movements along the Ukrainian borders and minor cyber attacks against Ukrainian private and public entities.