article thumbnail

FBI warns of ransomware gang – What you need to know about the OnePercent group

CyberSecurity Insiders

This gang of cybercriminals targets individuals within an organization with social engineering tactics designed to fool them into opening a document from a ZIP file attached to an email. How do hackers use social engineering? Encrypt all sensitive company data. Ensure all web traffic is encrypted with SSL or TLS.

article thumbnail

Ransomware news headlines trending on Google

CyberSecurity Insiders

And security researchers from ESET have discovered that the malware was uploaded to the VirusTotal operated system in Brazil and was targeted by a social engineering attack. Fourth is a news piece belonging to a Digital Transformation firm Orion Innovation which has been hit by the LockBit Ransomware group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

With quantum computing looming in the not-so-distant future, the way that we think about encryption will need to evolve. However, the complex math behind creating encryption keys is no match for the power of quantum computers. With 128-bit key encryption, it could take trillions of years to find a matching key.

Risk 134
article thumbnail

Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment

Thales Cloud Protection & Licensing

While the pandemic accelerated their digital transformation initiatives, it also expanded their threat surface and opened up opportunities for cybercriminals. In addition, telemedicine has generated a larger pool for potential phishing scams as well as other socially-engineered, and technically based, attacks (e.g.,

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

Without APIs there would be no cloud computing, no social media, no Internet of Things. APIs are the glue that keeps digital transformation intact and steamrolling forward. APIs have been a cornerstone of our digital economy from the start. But APIs also comprise a vast and continually-expanding attack surface.

article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

Social engineering tests Social engineering is a technique used by cyber criminals to trick users into giving away credentials or sensitive information. Attackers usually contact workers, targeting those with administrative or high-level access via email, calls, social media, and other approaches.

article thumbnail

Three Risk Mitigation Strategies to Address the Latest Data Security Threats

CyberSecurity Insiders

Digital identities have grown exponentially in recent years because of digital transformation, mobile adoption, online shopping, and the shift toward remote work and digital collaboration. Assess your identity and access management framework. Another concern involves the exposure of sensitive data.

Risk 118