Remove CISO Remove CSO Remove Social Engineering
article thumbnail

Strangest social engineering attacks of 2021

CSO Magazine

New research has highlighted the creative and occasionally unusual lengths fraudsters take to carry out social engineering attacks. global resident CISO at Proofpoint, tells CSO. To read this article in full, please click here

article thumbnail

NCSC warns industry, academia of foreign threats to their intellectual property

CSO Magazine

CISOs of companies both small and large understand how intellectual property (IP) and company infrastructure may be targeted from one of four vectors: malevolent insiders, unscrupulous competitors, criminals, or nation states.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

Meta, Apple emergency data request scam holds lessons for CISOs

CSO Magazine

had been successfully socially engineered into providing customer data in response to “emergency data requests” to individuals who they believed to be representing the U.S. A recent Bloomberg piece highlighted how Meta Platforms, Inc., parent company of Facebook) and Apple, Inc., government.

article thumbnail

Coinbase Hacked and Turns the Tables on the Cybercriminals!

Security Boulevard

With the loss of customer name and contact data, there may be some social engineering attacks, but Coinbase has already said they will make customer whole if that happens. How willing are their friends to identify the attackers, for a sweet reward? The hunters now become the hunted. Brilliant! appeared first on Security Boulevard.

Hacking 66
article thumbnail

Cybersecurity Snapshot: Tenable Report Warns About Toxic Cloud Exposures, as PwC Study Urges C-Suite Collaboration for Stronger Cyber Resilience

Security Boulevard

Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Less than 50% of respondents say their organizations’ CISOs are involved “to a large extent” with strategic planning, reporting to the board and overseeing tech deployments.

article thumbnail

Interview with Dr. Arun Vishwanath on the Latest Cybersecurity Attacks

CyberSecurity Insiders

The “people problem” is a phrase I heard in many different occasions when I met with IT managers (CISO, CSO, CIOs), many in leading research labs, national security establishments, and such. Some of the data that is stolen feeds social engineering attacks, where hackers use the stolen data to attack people and steal even more.