Remove Cyber threats Remove eBook Remove Phishing
article thumbnail

[eBook] A Step-by-Step Guide to Cyber Risk Assessment

The Hacker News

In today's perilous cyber risk landscape, CISOs and CIOs must defend their organizations against relentless cyber threats, including ransomware, phishing, attacks on infrastructure, supply chain breaches, malicious insiders, and much more. One of the most effective ways for CISOs and

article thumbnail

Retail and Hospitality Trending Holiday Cyber Threats

Duo's Security Blog

The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) just released the 2022 Holiday Season Cyber Threat Trends report that reveals the most prevalent malware tools leveraged by cyber criminals this year, with phishing and fraud dominating the list.

Retail 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An interview with cyber threat hunter Hiep Hinh

Malwarebytes

In this post, Hiep breaks down his threat hunting career and shares tips and best practices for those looking to become a cyber threat hunter (or who are just interested to listen!). Threat hunting is all about nipping stealthy attackers (and malware) in the bud. Hiep’s advice? ” says Hiep.

article thumbnail

ENISA Threat Landscape Report 2020

Security Affairs

I’m proud to present the ENISA Threat Landscape Report 2020 , the annual report published by the ENISA that provides insights on the evolution of cyber threats for the period January 2019-April 2020. It is an amazing work that identifies and evaluates the top cyber threats for the period January 2019-April 2020.

article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. Read more about the hidden costs of ransomware in our eBook.

article thumbnail

How to Stop Phishing Attacks with Protective DNS

Security Boulevard

Phishing Threats Are Increasing in Scale and Sophistication Phishing remains one of the most dangerous and widespread cybersecurity threats. Phishing is now the most common initial attack vector, overtaking stolen or compromised credentials. Phishing attacks are becoming more difficult to detect.

DNS 64
article thumbnail

2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping

Webroot

Earlier in 2021, we detailed the hidden costs of ransomware in our eBook. Many organizations when faced with an attack, gave into the demands of threat actors, paying hundreds of thousands of dollars on average. Ransomware. Since mid-October 2021, there have been more than 25 active strains of ransomware circulating.