Displaying items by tag: cybercriminals

Claroty’s Biannual ICS Risk & Vulnerability Report identifies critical infrastructure sectors most at risk and increased attention on security of industrial networks

GUEST RESEARCH by Claroty: Throughout the second half (2H) of 2020, 71% of industrial control system (ICS) vulnerabilities disclosed were remotely exploitable through network attack vectors, according to the second Biannual ICS Risk & Vulnerability Report released today by Claroty, the industrial cybersecurity company. The report also revealed a 25% increase in ICS vulnerabilities disclosed compared to 2019, as well as a 33% increase from 1H 2020.

Published in Guest Research

GUEST OPINION by Andrew Latham, Asia Pacific Technical Director, Ping Identity: As the number of mobile and web apps being used by businesses and consumers continues to grow, ensuring they remain as secure as possible is a constant challenge.

Published in Guest Opinion
Monday, 26 October 2020 23:44

Using fake data to protect against cyberattacks

GUEST OPINION by Jim Cook, Attivo Networks:  Separating truth from fiction in these days of social media campaigns and so-called fake news can often be challenging. As a result, false data that appears valuable can influence people.

Published in Guest Opinion

Cyber attacks on Internet-connected devices continue to rise at an alarming rate due to poor security protections and cybercriminals use of automated tools to exploit the vulnerabilities, according to a new report from Nokia.

Published in Security

GUEST OPINION by Jim Cook, Attivo Networks: The COVID-19 pandemic has been a rough and costly period for many organisations, yet for one group, it has opened up a raft of potentially lucrative new targets.

Published in Guest Opinion

GUEST OPINION by Simon Howe, Vice President Sales – APAC, LogRhythm: With large numbers of people now sitting in home offices in the wake of the COVID-19 pandemic, attention is turning to what this means when it comes to achieving effective IT security.

Published in Guest Opinion

COVID-19 related threats are the single largest type of threat in the first half of this year, according to one security firm which says it blocked 8.8 million COVID-19 related threats, nearly 92% of which were spam delivered via emails.

Published in Security
  • 20% jump in ransomware globally
  • 24% drop in malware attacks worldwide
  • 7% of phishing attacks capitalised on COVID-19 pandemic
  • 176% increase in malicious Microsoft Office file types
  • 23% of malware attacks leveraged non-standards ports
  • 50% rise of IoT malware attacks
  • Report analyses threat intelligence data gathered from 1.1 million sensors in over 215 countries and territories
Published in Security

GUEST OPINION by Joanne Wong, Vice President – International Marketing, LogRhythm:  It’s something almost every internet user has experienced. An email arrives, purporting to be from a trusted source, but in reality it’s an attempt to steal personal details or cause disruption.

Published in Guest Opinion

VENDOR CONTRIBUTION:  Cyber threats against OT and IoT infrastructure continued to grow in number and impact in the first half of 2020, with OT-reliant organisations increasingly embracing IoT devices, and COVID-19 forcing a global shift to remote work, according to a new global report.

VENDOR CONTRIBUTION: Cyber threats against OT and IoT infrastructure continued to grow in number and impact in the first half of 2020, with OT-reliant organisations increasingly embracing IoT devices, and COVID-19 forcing a global shift to remote work, according to a new global report.

Published in Security

GUEST OPINION by Linden Dawson, Customer Success Management Lead, Ping Identity: Amid all the issues and challenges being faced as we battle through the COVID-19 pandemic, one of the most overlooked is privacy protection.

GUEST OPINION by Linden Dawson, Customer Success Management Lead, Ping Identity: Amid all the issues and challenges being faced as we battle through the COVID-19 pandemic, one of the most overlooked is privacy protection.

Published in Data
Wednesday, 15 July 2020 15:05

How Hackers Can Abuse Contact Tracing Apps

By ProPrivacy

VENDOR PROMOTION Contact tracing apps could do a lot of good, but not if hackers get in the way. Here’s a quick list of three ways cybercriminals can abuse these apps.

Published in Guest Opinion
Wednesday, 15 July 2020 13:56

How Hackers Can Abuse Contact Tracing Apps

VENDOR PROMOTION Contact tracing apps could do a lot of good, but not if hackers get in the way. Here’s a quick list of three ways cybercriminals can abuse these apps.

Published in Security

Australian organisations continued to be plagued by ransomware and malware attacks by cybercriminals, according to global cybersecurity firm Sophos.

Published in Guest Opinion

GUEST OPINION by Pavan Thatha, Radware: The data sought by cybercriminals vary from one vertical to another, whether banking credentials, medical records, pricing information or confidential research, to name just a few.

GUEST OPINION by Pavan Thatha, Radware: The data sought by cybercriminals vary from one vertical to another, whether banking credentials, medical records, pricing information or confidential research, to name just a few.

Published in Security

GUEST OPINION By Mark Padginton, Key Account Manager JAMF: Most Australian businesses have deployed tools and services to improve their IT security, yet many remain vulnerable due to one key factor: human beings.

Page 1 of 3

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments