article thumbnail

Top 5 Cyber Predictions for 2024: A CISO Perspective

Security Boulevard

This past year set a profound stage, from the advent of stringent cyber regulations to the convergence of generative AI, social engineering, and ransomware. Last year, we witnessed the fast-evolving nature of social engineering attacks, and this evolution poses greater challenges for detection and defense.

CISO 104
article thumbnail

Zoom Security Issues Are a Wakeup Call for Enterprises

eSecurity Planet

The sharp increase in demand put a focus on security shortcomings in Zoom’s architecture – “Zoombombing” became a thing – that the company was quick to address. A little more than a week later, cybersecurity firm Armorblox outlined an account takeover attack that leveraged malicious phishing and social engineering.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft: Iranian Hackers Evolving Techniques in Espionage Campaigns

SecureWorld News

The social engineering tactics are highly tailored to build trust before delivering sophisticated malware. New capabilities observed include compromising legitimate email accounts to bolster credibility in phishing attempts. Follow SecureWorld News for more stories related to cybersecurity.

article thumbnail

ENISA 2023 Threat Landscape Report: Key Findings and Recommendations

Thales Cloud Protection & Licensing

Some of the key findings of the report are: Ransomware still gets top of the podium, accounting for 34% of EU threats. Attackers exploit the geopolitical environment and use AI-powered tools to create convincing deepfakes, disinformation campaigns, and social engineering attacks.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

Implementing a Zero Trust architecture involves verifying every attempt to access the system. S ameer Malhotra , CEO, TrueFort : Malhotra Software supply chain attacks will continue to place more responsibility and accountability on DevSecOps teams. I really feel as though the bad guys have the upper hand. Or rather, an organization!

article thumbnail

CISA updates ransomware guidance

Malwarebytes

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its #StopRansomware guide to account for the fact that ransomware actors have accelerated their tactics and techniques since the original guide was released in September of 2020. Consider subscribing to services that monitor the dark web for compromised credentials.

article thumbnail

Zero Trust Can’t Protect Everything. Here’s What You Need to Watch.

eSecurity Planet

Zero trust architecture is an emerging technology in cybersecurity that offers an alternative to the traditional castle-and-moat approach to security. Zero trust architecture requires perpetual maintenance. However, this doesn’t address a glaring issue staring everyone in the face: social engineering.