Remove Cyber threats Remove Digital transformation Remove Encryption Remove Social Engineering
article thumbnail

FBI warns of ransomware gang – What you need to know about the OnePercent group

CyberSecurity Insiders

This gang of cybercriminals targets individuals within an organization with social engineering tactics designed to fool them into opening a document from a ZIP file attached to an email. How do hackers use social engineering? Encrypt all sensitive company data. Ensure all web traffic is encrypted with SSL or TLS.

article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

With quantum computing looming in the not-so-distant future, the way that we think about encryption will need to evolve. However, the complex math behind creating encryption keys is no match for the power of quantum computers. With 128-bit key encryption, it could take trillions of years to find a matching key.

Risk 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2023 Cyber Threat Predictions

Digital Shadows

As we move towards the end of 2022, now is the time to take a look back at the major trends from the last eleven months and identify what might happen from a cyber threat perspective in 2023. A key for analysts is to remain flexible and not compartmentalize cyber threats.

article thumbnail

Phishing-resistant MFA 101: What you need to know

CyberSecurity Insiders

The spread of the remote workforce and the growth of digital transformation has exponentiated the number of login-based attack vectors. ATO is often initiated by credential theft and can be done using social engineering techniques (phishing attacks) or by bombarding login pages with bot-based attempts.

Phishing 109
article thumbnail

2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping

Webroot

The increased reliance on decentralized connection and the continued rapid expansion of digital transformation by enterprises, small to medium-sized businesses (SMBs) and individuals, provided cybercriminals with many opportunities to exploit and capitalize on unsuspecting businesses and individuals. “In Ransomware.