Remove B2B Remove Cyber Attacks Remove Phishing
article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Malicious actors are continually looking for better ways to carry out successful cyber attacks. This article focuses on the top five attack vectors organizations should look out for and defend against in 2022. Some threat actors carry out phishing attacks using social media and networking platforms, such as Twitter or LinkedIn.

IoT 139
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Erin: What are some of the biggest cyber threats that businesses face today? How can companies minimize risks?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Compromised logins continue to facilitate cyber attacks at all levels, from phishing ruses to credential stuffing to enabling hackers to probe deep inside of a breached network. So we want to provide the ability for an enterprise to just eliminate attack vectors.”

Passwords 164
article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

A Dynamic, Complex Threat Landscape Today’s cyber threat landscape is characterized by its dynamic and complex nature. No longer confined to isolated malware or phishing attacks, threats now encompass a wide range of sophisticated tactics, techniques, and procedures (TTPs) used by cybercriminals and nation-state actors alike.

article thumbnail

We can attract more women by busting the ‘hoodie’ stereotype

SC Magazine

As a result, there has been a marked increase in cyber attacks on cloud infrastructure as well as a rise in phishing attempts. Like many CISOs over the past year, I’ve seen the widespread and sudden transition to remote working complicate processes and introduce weak spots, making organizations vulnerable in brand new ways.

CISO 55
article thumbnail

SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats

eSecurity Planet

President Joe Biden for “massive cyberattacks” aimed at disrupting the Russian invasion – initial reports of cyber attacks have in some cases been destructive and damaging, but not anywhere near anyone’s worst-case fears of utility system attacks, for example. ” Protective Steps to Take.

B2B 125
article thumbnail

ROUNDTABLE: What happened in privacy and cybersecurity in 2021 — and what’s coming in 2022

The Last Watchdog

In 2021, we endured the fallout of a seemingly endless parade of privacy controversies and milestone cyber attacks. In 2022, we’ll see an inevitable continuation of attacks that have plagued businesses for years. Ransomware, phishing and social engineering attacks will all continue to increase.