article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Acohido to share his ideas about the current cyber threat landscape, the biggest threats for businesses today, the role of AI and machine learning in cyberattacks and cyberdefence, and the most effective methods for companies to protect themselves. Erin: What are some of the biggest cyber threats that businesses face today?

article thumbnail

‘Tis The Season for Holiday Cyber Threats Targeting Enterprises in a Pandemic World

McAfee

Supply chain and logistics, e-commerce and retail, and the travel industry traditionally experience holiday seasonal increases in consumer and business activity, making them more vulnerable to cyber threats and leaving business, employee, and consumer data at risk. of the total detected cyber threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

The Ongoing Cyber Threat to Critical Infrastructure. With that in mind, Thales has launched the 2022 Thales Data Threat Report Critical Infrastructure Edition, which includes responses from 300 security leaders and practitioners within critical infrastructure organizations. Thu, 07/21/2022 - 12:28.

article thumbnail

Emerging Trends in Cybersecurity: Strategies to Combat Cyber Extortion Attacks on Businesses in 2023

Cytelligence

In addition, Distributed Denial of Service (DDoS) attacks, Business Email Compromise (BEC), and phishing scams continue to pose significant threats. Emerging Trends in Cyber Security Strategies To combat these emerging threats, businesses must proactively adopt robust cybersecurity strategies.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

The cyber threat landscape is evolving rapidly. Our success will hinge on deploying AI in a way that not only matches, but anticipates and outmaneuvers, the threat actors’ evolving tactics. In 2024 I encourage leadership to dedicate more attention to discussing the risks of spear phishing. Educate your workforce.

article thumbnail

North Korean Hackers Intensify Cyberattacks on South's Arms Industry

SecureWorld News

The group employed sophisticated spear-phishing, watering hole attacks, and kernel-level malware to compromise the targets. Organizations can then work to counter these TTPs specific to each their assets, criticality, architecture, and other unique risks and considerations for that organization.

article thumbnail

GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue

The Last Watchdog

And when malware, ransomware, or other cyber threats get in the way, the focus shifts from forward progress to focused co-operation. The need for reset and oversight is so great that a new class of technology is emerging to give organizations a better grip on the digital sprawl that’s come to define modern-day enterprise architecture.

Risk 214