Cybersecurity automation can make a dramatic difference in both team performance and costs. However, calculating tangible ROI on purchases can be difficult. And quantifying ROI is critical to buy-in from leadership.
This guide shows that when choosing a SOAR platform, make sure it meets your current automation...
If "time is money," why spend it on all of those little tasks in a SOC that can add up, eating away at valuable workday hours? Automating these repetitive, low-level activities can free up valuable time so you can focus on more strategic initiatives, such as threat hunting and improving the overall security...
Android banking Trojan Xenomorph has resurfaced in a new campaign targeting cryptocurrency wallets and various financial institutions. The malware has been actively targeting users in Europe and is now focused on institutions in the United States, Canada, Spain, Italy, Portugal and Belgium.
With the rise of social engineering, large organizations continue to fall for credential-based phishing attacks, which often lead to costly breaches. Traditional multi-factor authentication (MFA) methods are increasingly under attack, and are especially prone to phishing. Join us to learn how to combat...
In Elastic Security Labs' inaugural threat report, explore threat phenomena and trends, gleaning recommendations to help you prepare for the future of cybersecurity. Learn about the latest malware research, attack patterns, and clusters of malicious activity from a team of seasoned threat researchers working with a...
To some extent, ransomware has become like COVID-19 - a threat we all need to learn to live alongside. But Aaron Bugal, field CTO of Sophos, says there is still much that security and technology leaders can do to reduce their risk by addressing activity that often precedes a ransomware attack.
Booking and reservation systems, as well as slot machines, hotel room door locks, ATMs and more remain offline at multiple MGM Resorts properties as the publicly traded casino hotel giant battles "a cybersecurity issue" that one group of security researchers has tied to a ransomware group attack.
According to the latest Sophos State of Ransomware report, there is a ransomware pandemic infecting businesses across the Asia Pacific region.
Ransomware is like COVID-19 – a threat that all businesses need to learn to live with.
In this e-book, Sophos’ Field CTO for Asia Pacific Aaron Bugal discusses with...
According this report, the rate of ransomware attacks has remained steady. Sixty-six per cent of research respondents said their organization was hit by ransomware in the previous year. With adversaries now able to consistently execute attacks at scale, ransomware is arguably the biggest cyber risk facing...
A backdoor Trojan known as SmokeLoader is deploying a customized Wi-Fi scanning executable to triangulate the location of infected Windows devices. The malware, dubbed "Whiffy Recon," uses nearby Wi-Fi access points as a data point for Google's geolocation API.
In the latest weekly update, ISMG editors discuss important cybersecurity and privacy issues including highlights of interviews at Black Hat 2023, lessons learned from the success of the Lapsus$ cybercrime group's attacks and why Check Point is buying startup Perimeter 81 for $490 million.
Cybercriminals continue to rely on proven attack methods while developing new ways to infiltrate digital environments and break through your human defense layer.
But how can you reduce your organization’s attack surface? We looked at 12.5 million users across 35,681 organizations to find out.
In this webinar...
With the recent global resurgence of Pegasus, come join a discussion about, what we are calling "arguably the most sophisticated mobile spyware we've seen yet". See how Pegasus works, its history, campaigns, and those who enjoy traveling, we will also talk about steps you can take to better protect yourself.
Join...
According to a report by IBM, the average cost of a ransomware attack, not including the cost of the ransom, is $4.54 million. Further reports by Sophos and Palo Alto, estimate that the ransom amount averaged between $570,000 and $812,360.
As the damage caused to organizations because of such attacks are in...
North American cybersecurity agencies are warning about a new variant of the Truebot Trojan that collects and exfiltrates information from victims. The new variant attacks a known critical-severity vulnerability - a remote code execution vulnerability in the Netwrix Auditor.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.