The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are...
It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.
So, how can...
Déjà vu basic cybersecurity challenge all over again: With the U.S. government warning that geopolitical tensions could trigger wiper-attack reprisals, security experts review the basic anti-wiper - and anti-ransomware - defenses organizations should already have in place.
Numerous industries, including financial services, rely on transaction-based controls to help spot and block fraud. But increasingly, organizations are also using session-based fraud detection and prevention.
Download this eBook to learn more about:
Why and how adoption of session-based fraud detection has been...
In the last several years, Financial Services organizations have undergone rapid digital transformation. They rely on social media and digital platforms to generate brand awareness, provide online banking and other financial services, and to offer support and services to customers. This has created new avenues and...
Did you know that public exploits for business applications have increased 100 percent since 2015?Today, over 77 percent of the world's transactional revenue touches an ERP system, making these applications an attractive target for cyber criminals looking to profit from the highly-sensitive and regulated data that...
A month after Baltimore's IT network was hit with the RobbinHood ransomware variant, officials believe the May 7 attack will cost $18 million, which includes recovering and restoring computer systems as well as lost municipal revenue.
The latest edition of the ISMG Security Report analyzes the "blame game" in the wake of a ransomware attack against the city of Baltimore. Also featured: Discussions of cyberthreats in the financial services sector and open source security concerns.
The good news is: The development of new malware
exploits has slowed considerably. The bad news is:
That's because the old ones still continue to work so
Download this whitepaper to learn more about:
The new malware landscape;
How ransomware has matured;
How organizations can build resilience into...
C-level executives are 12 times more likely to be the target of social incidents and nine times more likely to be the target of social breaches. This is among the key findings of the latest Verizon's Data Breach Investigations Report. Author John Grim shares insight.
The bad guys are getting very creative, impersonating an executive in your organization and asking for financial reports or they ask employees in payroll to make changes to bank accounts. According to the FBI, their efforts have earned them an estimated $12 billion through Business Email Compromise also know as CEO...
Emotet is one of the most costly and destructive threats around.
Download this whitepaper and learn:
What Emotet is, how it works, and why it's so very, very dangerous;
Discover how Sophos technologies give you the best possible protection against Emotet - both individually and working together:,
Get the three...
Emotet pushes Ryuk, GandCrab taps NTCrypt, and BokBot borrows from Trickbot. With millions to be potentially stolen from victims, is it any wonder that malware-wielding gangs continue to get a little help from their cybercrime friends?
Officials in Jackson County, Georgia, along with the FBI are investigating a ransomware attack that crippled IT systems over a two-week period and reportedly led local officials to pay a bitcoin ransom worth $400,000 to restore systems and infrastructure.
A rush by some media outlets to attribute a late-2018 alleged Ryuk ransomware infection at Tribune Publishing to North Korean attackers appears to have been erroneous, as many security experts warned at the time. Rather, cybercrime gangs appear to be using Ryuk, according to researchers at McAfee and Coveware.