Remove 2028 Remove Phishing Remove Risk
article thumbnail

Cybersecurity in Aviation: Rising Threats and Modernization Efforts

SecureWorld News

Additionally, a distributed workforce, ranging from remote maintenance technicians to cabin crews, multiplies entry points for social-engineering tactics like phishing. Comprehensive risk assessments across information and operational technology (OT) systems lay the groundwork for targeted defenses. Beyond hardware, the U.S.

article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

Check out key findings and insights from the Tenable Cloud AI Risk Report 2025. 1 - Tenable: Orgs using AI in the cloud face thorny cyber risks Using AI tools in cloud environments? 1 - Tenable: Orgs using AI in the cloud face thorny cyber risks Using AI tools in cloud environments?

Risk 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Top Cloud Attacks and How to Protect Against Them

Digital Shadows

With public cloud services spending projected to hit $805 billion in 2024 and double by 2028 , understanding the threats facing cloud environments is critical. In this blog, we focus on three of the five threats from the report: API compromise, SaaS-based phishing, and cloud environment hijacking.

article thumbnail

The Cybersecurity Challenge in Mergers and Acquisitions

Digital Shadows

One private equity CISO reported a 400% increase in phishing attempts on acquired companies post-M&A deal announcements. Together, these factors magnify any existing vulnerabilities, transforming manageable risks into significant threats during the M&A period. Inconsistent asset management further exacerbates the risk.