85% of Data Breaches Involve Human Interaction: Verizon DBIR

85% of Data Breaches Involve Human Interaction: Verizon DBIR Ransomware, phishing, and Web application attacks all increased during a year in which the majority of attacks involved a human element. Web application attacks, phishing, and ransomware increased over the past year, emphasizing a shift as attackers took advantage of people working from home and spending … Continue reading 85% of Data Breaches Involve Human Interaction: Verizon DBIR

Adapting to the Security Threat of Climate Change

Adapting to the Security Threat of Climate Change Business continuity plans that address natural and manmade disasters can help turn a cataclysmic business event into a minor slowdown. Climate change is a generational risk with profound implications to alter not just our physical world but our digital world, too. While not traditionally associated as a … Continue reading Adapting to the Security Threat of Climate Change

US CISA and FBI publish joint alert on DarkSide ransomware

FBI and DHS’s CISA have published a joint alert on DarkSide ransomware activity after the disruptive attack on Colonial Pipeline. FBI and DHS’s CISA have published a joint alert to warn of ransomware attacks conducted by the DarkSide group. The alert comes after the disruptive attack that hit Colonial Pipeline that caused chaos and disruption. … Continue reading US CISA and FBI publish joint alert on DarkSide ransomware

Ransomware attackers are now using triple extortion tactics

Attackers are not only demanding ransom from organizations, but also threatening their customers, users and other third parties. Cybercriminals who specialize in ransomware have already been using double extortion tactics in which they not only decrypt stolen data but also threaten to leak it publicly unless the ransom is paid. Now, some attackers have progressed … Continue reading Ransomware attackers are now using triple extortion tactics

Vulnerable Protocols Leave Firms Open to Further Compromises

Vulnerable Protocols Leave Firms Open to Further Compromises Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability. Nearly nine out of every 10 companies have devices that use outdated protocols, such as Microsoft's Server Message Block version 1 … Continue reading Vulnerable Protocols Leave Firms Open to Further Compromises