Remove Cyber Risk Remove Media Remove Social Engineering
article thumbnail

Romantic Lawsuit for Two? Don't Let Cybercriminals Scam You this Valentine's Day

SecureWorld News

And 2025 will be no different, as increasingly sophisticated online hackers seek to take advantage of Valentine's themed email traffic, social media advertisements, or marketing campaigns, and exploit heightened emotions and a desire to connect. Last year saw a 110% rise in cybercrime in the lead up to Valentine's Day.

Scams 84
article thumbnail

Cisco Contributes to Cyber Hard Problems Report

Cisco Security

Last updated in 2005, this latest edition of Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future focuses on the massive evolution that has occurred in cybersecurity, digital systems and society as a whole over the last several years. Cloud computing was nascent and was still without online storage and elastic compute.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Ponemon study warns: AI-enhanced deepfake attacks taking aim at senior execs

The Last Watchdog

As AI technology advances, attackers are shifting their focus from technical exploits to human emotions using deeply personal and well-orchestrated social engineering tactics. Typically, the attacker collects authentic media samples of their target, including still images, videos, and audio clips, to train the deep learning model.

article thumbnail

Qantas: Breach affects 6 million people, “significant” amount of data likely taken

Malwarebytes

Qantas says the breach occurred after a cybercriminal targeted a call centre and managed to gain access to the third party platform, presumably via social engineering. The breach at a third party provider is extra painful since Qantas concluded an uplift of third and fourth-party cyber-risk governance processes in 2024.

article thumbnail

Story of the Year: global IT outages and supply chain attacks

SecureList

This case underscores the serious risk that social engineering and supply chain attacks pose to open-source projects. Recent incidents in the Middle East involving pagers have illustrated the risks associated with hardware supply chain attacks. Media sources reported that explosives had been concealed within the devices.

Internet 104
article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyber risk owners.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. These groups are also shifting toward more human-centric exploits , like social engineering and insider assistance.