Cyber Insights 2023 | Regulations
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…Cyber Insights 2023: Artificial Intelligence
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…Cyber Insights 2023: Attack Surface Management
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…Start the New Year Right With This 3-Step Digital Detox
Pledging to follow healthier habits is consistently the most popular new year’s resolution. That January 1st promise looks different to everyone: snacking less often, going to the gym more often, drinking more water, drinking less soda, etc. This year, instead of a juice cleanse subscription, opt for a healthier habit that’s not an unappetizing shade […] more…Here’s How to Steer Clear of Bot Accounts on Social Media
“Congratulations, you’re a winner!” “Did you know this public figure is trying to make your life worse? Click here for what they don’t want you to know.” “Save thousands today with just one click!” Spam and bot accounts on social media are everywhere. You’ve likely encountered messages like these that attempt to get you to […] more…Back to School: Tech Savvy vs. Cyber Savvy
The first day of school is right around the corner. The whole family is gearing up for a return to the routine: waking up to alarm clocks at dawn, rushed mornings, learning all day, and after-school activities and homework all night. Even though everyone is in a frenzied state, now is a great time to […] more…5 Steps to Removing Your Personal Information From the Internet
A recent report by Javelin Strategy and Research found that identity theft cost Americans $56 billion in 2020, with imposter scams accounting for 20% of online fraud. While most internet platforms have stringent data security measures in place to curb cyber fraud, they aren’t always fool-proof. Your user information is available online as a result […] more…Getting Your Kids Ready for School—And Their Smartphones Too
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school. Their smartphones are going back too. Our recent global research showed just how many tweens and teens use a smartphone. Plenty. Depending on the age band, that figure ranges anywhere from 76% to 93%, with […] more…The Case for 2FA by Default for WordPress
Administrator panel compromises are one of the most common attacks that everyday WordPress website admins face. We work with thousands of clients who have encountered attacks on their websites and I’ve long ago lost count of the number of times that I’ve told clients that the point of entry was their WordPress login page. Brute […] more…Lock Down & Level Up: Protect Your Online Gaming from Hackers
As a gamer, you love the stuff you’ve racked up over the years—that rare Fortnite skin from six seasons ago, a complete set of Tier 20 armor in World of Warcraft, or a Steam account loaded with your favorite titles. Hackers love it too. Because they can make money off it. Hackers have been stealing […] more…Spam and phishing in 2021
Figures of the year In 2021: 56% of e-mails were spam 77% of spam was sent from Russia with another 14.12% from Germany Our Mail Anti-Virus blocked 148 173 261 malicious attachments sent in e-mails The most common malware family found in attachments were Agensla Trojans Our Anti-Phishing system blocked 253 365 212 phishing links Safe Messaging blocked 341 954 […] more…The life cycle of phishing pages
Introduction In this study, we analyzed how long phishing pages survive as well as the signs they show when they become inactive. In addition to the general data, we provided a number of options for classifying phishing pages according to formal criteria and analyzed the results for each of them. The resulting data and conclusions […] more…The story of the year: ransomware in the headlines
In the past twelve months, the word “ransomware” has popped up in countless headlines worldwide across both print and digital publications: The Wall Street Journal, the BBC, the New York Times. It is no longer just being discussed by CISOs and security professionals, but politicians, school administrators, and hospital directors. Words like Babuk and REvil […] more…WIRTE’s campaign in the Middle East ‘living off the land’ since at least 2019
Overview This February, during our hunting efforts for threat actors using VBS/VBA implants, we came across MS Excel droppers that use hidden spreadsheets and VBA macros to drop their first stage implant. The implant itself is a VBS script with functionality to collect system information and execute arbitrary code sent by the attackers on the […] more…Threats to ICS and industrial enterprises in 2022
Continuing trends In recent years, we have observed various trends in the changing threat landscape for industrial enterprises, most of which have been evolving for some time. We can say with high confidence that many of these trends will not only continue, but gain new traction in the coming year. Further evolution of cyberthreats as […] more…Cyberthreats to financial organizations in 2022
First of all, we are going to analyze the forecasts we made at the end of 2020 and see how accurate they were. Then we will go through the key events of 2021 relating to attacks on financial organizations. Finally, we will make some forecasts about financial attacks in 2022. Analysis of forecasts for 2021 […] more…More information
- Germany Jails Operators of ‘Cyberbunker’ Darknet Hub
- Intelligence is Not a Numbers Game
- Lessons to learn from the MongoHQ database breach
- Understanding ‘Location Services’ and Your Kids’ Mobile Digital Trail
- Law Firm Says Google Employee Information Compromised in Data Breach
- iPhone XS and XS Max review: Big screens, big performance, big lenses, big prices
- Hackers Deface Network Switches in Russia, Iran with US Flag
- Bitstamp claims its bitcoins are secure after attack forces exchange shutdown
- Microsoft SQL Server CVE-2016-7252 Information Disclosure Vulnerability
- 9 Browser Extensions to Help You Search the Web Better