article thumbnail

Our Top 10 Cybersecurity Podcast Episodes

SecureWorld News

Details: We discuss the "Big Four" nation-state bad actors and the cyber attacks they are capable of. Also, we cover the top 10 cyber attack methods used by Iran and its hacking groups. Featured interview: CISO and cyber attorney Alexander Urbelis who uncovered this cyberattack. Details: Can Huawei be trusted?

article thumbnail

Security Roundup October 2023

BH Consulting

Ransomware an ongoing threat to industry as crime gangs organise Malware-based cyber-attacks are the most prominent threat to industry, Europol says. The report also sheds light on the growing professionalism of cybercrime groups, with many organising through affiliate programmes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Machine Identities Can Imperil Enterprise Security

eSecurity Planet

Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. If the past few years of cybercrime trends indicate anything, it’s that companies have a shocking number of vulnerabilities – and cybercriminals are getting better at exploiting them.

IoT 117
article thumbnail

3CX Hit with Massive Supply Chain Attack

SecureWorld News

We have a security team, we do our own pentesting, we've got software scanners, we got a CSO of course. The attack on 3CX is believed to be sophisticated, but there were clear indicators that could have tipped off 3CX to the breach before customer systems were affected. It's just we didn't understand before the severity of it.

CSO 67
article thumbnail

Cybersecurity Awareness Month: Security Experts Reflect on Safety

CyberSecurity Insiders

Since last October, we have seen enterprises such as SolarWinds, Colonial Pipeline, JBS USA Holdings, Kesaya, Olympus and more become victims of large-scale cyber attacks, causing ripple effects for the companies and their customers. digital infrastructure against frequent and sophisticated attacks. Let’s admit it.