Remove Architecture Remove IoT Remove Phishing Remove Social Engineering
article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Network Security: Study network protocols, such as TCP/IP, and analyze common network attacks like DDoS, phishing, and man-in-the-middle attacks. Social Engineering: Investigate the human element of cybersecurity by exploring social engineering techniques and tactics used to manipulate individuals.

article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Cyberattacks and data breaches will continue to arise because of credential theft, social engineering (phishing, smishing, vishing etc), vulnerabilities in third party software and supply chain processes, forged or stolen machine identities, and misconfigured cloud computing. Here are my predictions for 2023. Types of attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ENISA 2023 Threat Landscape Report: Key Findings and Recommendations

Thales Cloud Protection & Licensing

Attackers exploit the geopolitical environment and use AI-powered tools to create convincing deepfakes, disinformation campaigns, and social engineering attacks. The report notes that these attacks can have significant implications for democratic processes, social cohesion, and national security.

article thumbnail

Emerging Trends in Cybersecurity: Strategies to Combat Cyber Extortion Attacks on Businesses in 2023

Cytelligence

In addition, Distributed Denial of Service (DDoS) attacks, Business Email Compromise (BEC), and phishing scams continue to pose significant threats. Embracing Zero Trust Architecture: The traditional perimeter-based security model is no longer sufficient in today’s threat landscape.

article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

This will not only help better test the architectures that need to be prioritized, but it will provide all sides with a clear understanding of what is being tested and how it will be tested. Social engineering tests Social engineering is a technique used by cyber criminals to trick users into giving away credentials or sensitive information.

article thumbnail

Securing the Supply Chain During Shipping Challenges

CyberSecurity Insiders

Implement Zero-Trust Architecture. Verifying machine identities before enabling access can help secure Internet of Things (IoT) networks, which would otherwise expand supply chains’ attack surfaces. Distracted workers are particularly vulnerable to social engineering attacks, but thorough training can mitigate these risks.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Byron: The economic impact of phishing, ransomware, business logic hacking, Business Email Compromise (BEC) and Distributed Denial of Service (DDoS) attacks continues to be devastating. Erin: What are some of the most common social engineering tactics that cybercriminals use?