article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. Here are some of the findings from the report.

article thumbnail

Seeking Reconnection: Internet Usage and the Return to Travel

McAfee

Even as the internet kept us connected with family and friends during the pandemic, people remain understandably eager to reconnect in person as vaccines roll out and restrictions ease. and on top of the latest consumer and mobile security threats, follow? In fact, people are making travel plans accordingly. McAfee_Home? ?on

Internet 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape

The Security Ledger

Jim and I talk about the findings of DirectDefense’s latest Security Operations Threat Report and dig into the intriguing ways artificial intelligence (AI) is shaping both cyberattack and defense automation strategies.

article thumbnail

Pros and Cons of Continual Compliance Solutions for Cybersecurity

Security Boulevard

According to the Sophos 2022 Threat Report, ransomware threats, along with attacks on internet infrastructure and malware on mobile devices, continue to rise in the volume of attempted and successful attacks.

article thumbnail

Recent Cyber Attacks Illustrate Why Your Organization Needs a Cybersecurity Strategy

Security Boulevard

The growth of the internet has been a mixed blessing. Information Technology (IT) staff use threat reporting to identify and map the threat landscape and identify the types […]. Technological advancement has spread across the globe and improved daily living.

article thumbnail

BrandPost: DDos Extortion Takes VoIP Providers Offline

CSO Magazine

Threat actors are continually innovating and rethinking their attack patterns – as well as who they target with attacks. This is clearly seen in their targeting of Voice over Internet Protocol (VoIP) providers, as highlighted in NETSCOUT’s 2H 2021 Threat Report. Why target VoIP providers?

DDOS 109
article thumbnail

CISA warns to address SAP ICMAD flaw immediately

Security Affairs

Internet Communication Manager Advanced Desync (ICMAD) is a memory pipes (MPI) desynchronization vulnerability tracked as CVE-2022-22536. The US Cybersecurity and Infrastructure Security Agency (CISA) warnes admins to address the ICMAD flaw affecting SAP business apps using Internet Communication Manager (ICM).