article thumbnail

The Pain of Double Extortion Ransomware

Thales Cloud Protection & Licensing

According to a recent market study 1 , 71% of individuals surveyed said double and triple extortion tactics have grown in popularity over the last 12 months, and 65% agree that these new threats make it tougher to refuse ransom demands.

article thumbnail

2019 Recap: A Year to Remember

McAfee

Working Even Harder To End the Cybersecurity Talent Shortage. The term “skills gap” is all too familiar to those in the cybersecurity industry. The talent shortage , coupled with the increasing volume of threats and the changing cybercrime landscape, presents a problem which is only getting worse. A Strong Presence at RSA.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

To Fix DMARC Requires Angry Customers

eSecurity Planet

Emails Don’t ‘Pass’ – They Are Allowed To Bypass Cloudflare released its inaugural Phishing Threats Report recently and cited over 1 billion instances of brand impersonations detected in SPAM, email threats, and malicious messages.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Threat intelligence feeds are continually updated streams of data that inform users of different cybersecurity threats, their sources, and any infrastructure impacted or at risk of being impacted by those threats. Cons One of the most expensive threat intelligence feeds on the market, and prices continue to go up.

article thumbnail

2024 State of Cybersecurity: Reports of More Threats & Prioritization Issues

eSecurity Planet

The 2023 vendor surveys arriving this quarter paint a picture of a cybersecurity landscape under attack, with priority issues affecting deployment, alert response, and exposed vulnerabilities. This article details two major findings from the report: five major cybersecurity threats and prioritization problems.

article thumbnail

APT trends report Q1 2021

SecureList

Our latest reports focus on the changes the threat actor made to the September and November versions of its backdoor. Thanks to the shared IoCs, we were able to attribute this attack, with high confidence, to the Gamaredon threat actor. webshells and Exaramel implants. Final thoughts.

Malware 138