Remove 2020 Remove Phishing Remove Social Engineering Remove Threat Reports
article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

As we mentioned in a previous blog , hackers come in many forms, but their methods can generally be classified into three distinct types of cybercriminals: The Impersonator – Hackers that pretend to be others, often using social engineering and human psychology to trick users. Let’s look at a few primary examples.

Scams 108
article thumbnail

Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment

Thales Cloud Protection & Licensing

Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment. Tue, 11/17/2020 - 06:44. While the pandemic accelerated their digital transformation initiatives, it also expanded their threat surface and opened up opportunities for cybercriminals. ransomware). Encryption. Data security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Remote Work is Here to Stay, and Other Cybersecurity Predictions for 2021

Webroot

Read on for more details from leading engineers, security analysts and product specialists from around our organization for complete cybersecurity predictions for 2021. Take heart because, whatever happens, 2020 won’t be easily outdone (knock on wood). David Dufour, VP of engineering, Carbonite + Webroot. Tyler Moffitt, Sr.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

With that in mind, Thales has launched the 2022 Thales Data Threat Report Critical Infrastructure Edition, which includes responses from 300 security leaders and practitioners within critical infrastructure organizations. Download the full Thales 2022 Data Threat Report for the Critical Infrastructure for more information.

article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

McKinsey & Company raised the alarm in 2020. Then, they reported 87% of organisations worldwide were already facing a skill gap or would face a severe talent shortage by 2025. Could it get any worse? Sadly, yes. The digital world has a skills shortage. It’s dire, and there’s intense competition for top talent.

CISO 130
article thumbnail

APT trends report Q3 2022

SecureList

The victims are targeted with spear-phishing emails that trick them into mounting a malicious ISO file and double-clicking an LNK, which starts the infection chain. We have been tracking this threat actor for several years and previously published an APT threat report describing its malicious operations.

Malware 138
article thumbnail

Threat Report Portugal: Q4 2021

Security Affairs

The Threat Report Portugal: Q4 2021 compiles data collected on the malicious campaigns that occurred from July to September, Q4, of 2021. This makes it a reliable and trustworthy and continuously updated source, focused on the threats targeting Portuguese citizens. The submissions were classified as either phishing or malware.