article thumbnail

Cybersecurity in Aviation: Rising Threats and Modernization Efforts

SecureWorld News

Additionally, a distributed workforce, ranging from remote maintenance technicians to cabin crews, multiplies entry points for social-engineering tactics like phishing. Employee training is paramount as staff awareness can thwart phishing and social-engineering attempts before any significant damage occurs. Beyond hardware, the U.S.

article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

At a high-level, these are the three main key milestones proposed by the NCSC: By 2028 Define the organizations migration goals. In the guidance, we describe the key steps in such a transition, and illustrate some of the cryptography and PQC-specific elements required at each stage of the programme, reads a companion blog.

Risk 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Top Cloud Attacks and How to Protect Against Them

Digital Shadows

With public cloud services spending projected to hit $805 billion in 2024 and double by 2028 , understanding the threats facing cloud environments is critical. In this blog, we focus on three of the five threats from the report: API compromise, SaaS-based phishing, and cloud environment hijacking.

article thumbnail

The Cybersecurity Challenge in Mergers and Acquisitions

Digital Shadows

One private equity CISO reported a 400% increase in phishing attempts on acquired companies post-M&A deal announcements. Seen as temporarily vulnerable, these entities will likely face opportunistic phishing attacks for initial access, followed by ransomware deployment. Totaling an impressive $2.5