Remove CSO Remove Cyber threats Remove Phishing
article thumbnail

Cybersecurity’s Comfort Zone Problem: Are you Guilty of it?

Jane Frankland

The hard truth is that technology alone cant fix the root causes of cyber risk. Whether its a mis-click on a phishing email, poor password management, acting on a deepfake, or a misconfiguration, human error accounts for most breaches. These are challenges that require more than just a flashy new tool to overcome.

Risk 100
article thumbnail

OT Under Siege No More? Fortinet Report Shows Improving Landscape

SecureWorld News

Based on a global survey of more than 550 OT professionals, the findings reveal both a maturing OT security landscape and the persistent threats it continues to face. One of the most striking revelations in the report : 52% of organizations now report that the CISO/CSO is responsible for OT cybersecurity, up from just 16% in 2022.

CISO 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Insider threats are particularly insidious, as attackers increasingly rely on employeesmalicious or unwittingas entry points. Often, these threats are deeply hidden, making them harder to detect and manage than external attempts. Ethics The ethical challenges posed by advancing AI technologies will demand urgent attention in 2025.

article thumbnail

Security Roundup April 2025

BH Consulting

Third-party risk rises as a factor in breaches: Verizon DBIR 2025 Verizons latest annual Data Breach Investigations Report (DBIR) shows some concerning trends with a sharp escalation in global cyber threats. Its top three cybercrimes, based on reports from victims, were: phishing/spoofing, extortion and personal data breaches.

article thumbnail

Deloitte-NASCIO Study: AI and Cyber Threats Reshape the Landscape

SecureWorld News

On the other hand, malicious actors are leveraging AI for more sophisticated attacks, such as deepfakes and AI-enhanced phishing. This is complicating threat landscapes as states work to keep pace with AI-driven cyberattacks while also embracing AI to improve defense strategies.

article thumbnail

Australian electric grid vulnerable to Cyber Attacks via Solar Panels

CyberSecurity Insiders

Because of some vulnerabilities in solar panels and smart devices, security experts state that the Australian Electricity Grid is becoming super vulnerable to cyber attacks. And unless these devices are secure enough, their usage can invite more troubles,” said Alistair MacGibbon, the CSO of CyberCX.

article thumbnail

New hyperactive phishing campaign uses SuperMailer templates: Report

CSO Magazine

“The SuperMailer-generated emails have been reaching inboxes at an increasingly remarkable volume,” Brah Haas, cyber threat intelligence analyst at Cofense, said in a blog post. To read this article in full, please click here