Americans have their sensitive bits exposed over 700 times a day

Disgusted PC

Americans have sensitive data relating to their online activity and location exposed 747 times daily, almost twice as much as Europeans who have their data exposed 376 times a day on average.

A new report from Atlas VPN looks at real-time bidding (RTB), which runs in the background on websites and apps and tracks what you look at, no matter how private or sensitive it is.

Continue reading

BEC attacks get more businesslike to trick users

Holding email icon

Business email compromise attacks are up 53 percent over the last year and are increasingly trying to look more like legitimate emails in their use of language.

A new report from Armorblox shows 74 percent of BEC attacks are using language as the main attack vector.

Continue reading

Business-critical systems going unsecured and unmonitored

endpoint security

According to a new poll 40 percent of enterprises don't include business-critical systems such as SAP in their cybersecurity monitoring. In addition, a further 27 percent are unsure if systems are included in their cybersecurity monitoring at all.

The survey from Logpoint also shows only 23 percent say the process of reviewing SAP logs for cybersecurity events or cyberthreat activity is automated through SIEM, with almost 19 percent still doing so manually.

Continue reading

Identity-based attacks are top threat to businesses

identity theft hacker

Ransomware, software supply chain attacks, data breaches, and more have become an almost daily occurrence in an increasingly challenging threat landscape.

Automated threat detection company Blumira has released a new report based on its security detections which reveals that identity-based attacks and living off the land behaviors were the top threats organizations faced in 2021.

Continue reading

Consumers want digital identity verification from online brands

identity verification

Providing a digital identity to create an online account or complete a transaction is becoming more commonplace globally and consumers are now expecting this as part of their engagement with a business.

Research carried out by Opinium for Jumio surveyed 8,000 adult consumers split evenly across the UK, US, Singapore and Mexico. It finds that 57 percent now say they have to use their digital identity 'constantly' or 'often' to access their online accounts.

Continue reading

Website shadow code represents major risk for enterprises

Shadow IT

A new report from web application protection specialist Source Defense highlights the risk presented by the use of third and fourth party code on corporate websites.

The digital supply chain means that highly dynamic and unpredictable scripts and code from third parties and beyond, permeate every aspect of a business's web presence. This shadow code has led to some high profile breaches including the British Airways hack in 2018.

Continue reading

Elevation of privilege is the top Microsoft vulnerability category

server vulnerability unlock

A new report into Microsoft vulnerabilities shows 2021 saw a 47 percent decrease in critical vulnerabilities, marking the lowest ever total since the report began.

The 2022 Microsoft Vulnerabilities Report from BeyondTrust also reveals that for the second year running, elevation of privilege was the #1 vulnerability category, accounting for 49 percent of all vulnerabilities.

Continue reading

Growing complexity leads enterprises to look for new service providers

Cloud maze complexity

A new study from CloudBolt Software reveals that 80 percent of enterprises are so frustrated with their existing cloud-oriented provider they are actively looking for a replacement within the next twelve months.

At the core of this dissatisfaction with CSPs and MSPs is the growing complexity of multi-cloud environments, and a widening skills gap among both enterprises and service providers.

Continue reading

Two-thirds of data breaches at UK legal firms caused by insiders

gavel books lawyer law

New analysis of data breaches in the UK legal sector reveals that 68 percent were caused by insiders.

Analysis by secure cloud platform NetDocuments of data from the Information Commissioner's Office (ICO) reveals evidence of a 'Great Exfiltration' where employees are leaving their jobs and taking their company's data with them.

Continue reading

Why the voice network is a blind spot for security professionals [Q&A]

Male hand hanging up phone

We're familiar with threats to data and data networks, but there's another part of corporate communication that's often overlooked yet represents an equally valid attack vector and equally high risks.

We spoke to Mutare CTO Roger Northrop to find out more about the risks voice networks present and why organizations need to take them seriously.

Continue reading

The Art of Cyberwarfare [Review]

Art of Cyberwarfare

In recent years cyberattacks have evolved from being the preserve of individual hackers to something much more serious, carried out by organized criminals and even nation states with the aim of espionage and financial gain.

This makes the process of investigating and defending against attacks more important than ever, but the sophistication of the methods used doesn't make the process any easier. This new book from security strategist Jon DiMaggio offers an investigator's guide to understanding the latest generation of threats.

Continue reading

UK police force becomes first to deploy new digital forensics solution

Deep Data Search digital forensics

Thanks to increased use of computers and mobile phones almost every crime now has some form of digital element. This has put a strain on the police's ability to investigate effectively and inevitably led to delays.

West Midlands Police in the UK has become the first to deploy a new cloud-based digital forensic solution from Exterro which allows greater collaboration between officers and means cases can be worked on remotely and resolved at greater speed.

Continue reading

What is unified observability and why is it important? [Q&A]

Binoculars laptop

There has been much discussion around observability in the past few months. With the adoption of hybrid work models and cloud systems, IT leaders have quickly realized the business and security value of creating transparency within their existing tech infrastructure.

Digital experience company Riverbed has announced a business move towards a market it's calling 'unified observability'. The company's vice-president Mike Marks spoke to us about the unified observability concept, why it's integral to IT decision-makers' strategies and offers some thoughts on how enterprises can begin integrating it within their current operations.

Continue reading

Want a well-paid a career? Have you considered cybercrime?

Gangsters with cash

OK, so there may not be a pension scheme and a company car, but rookie fraudsters are taking home approximately $18,700 (£15,000) a month with 'cybercriminal CEOs' making up to three times as much as their counterparts in legitimate businesses. According to a new report from Arkose Labs.

The return on investment for launching cyber attacks or committing online fraud is larger than ever before. Some of the highest earning fraudsters are known to be making around $7.5 million (£6 million) a year according to even the most conservative estimates. This is almost three times the amount that FTSE 100 chief executives were paid in 2020, when they earned an average $3.4m (£2.7m).

Continue reading

New solution aims to address quantum security threats

quantum computing

We all know that quantum computing is going to offer a major boost in computing power. But that power also represents a threat to cryptographic systems, potentially putting the world's data at risk.

To address the issue QuSecure is launching an industry first end-to-end post-quantum cybersecurity (PQC) software-based solution designed to protect encrypted communications and data with quantum-resilience.

Continue reading

Load More Articles