Remove Phishing Remove Ransomware Remove Security Awareness Remove Threat Reports
article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. Here are some of the findings from the report. Ransomware.

article thumbnail

BrightCloud® Threat Report Mid-Year Update: Reinvention is the Name of the Game

Webroot

When was the last time you secretly smiled when ransomware gangs had their bitcoin stolen, their malware servers shut down, or were forced to disband? Indeed, some of the most destructive and costly ransomware groups are now in their third incarnation. PHISHING PREYED ON A VOLATILE MARKET. MALWARE CONTINUES TO ITERATE, AND GROW.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Report Portugal Q1 2020

Security Affairs

Threat Report Portugal Q1 2020: Phishing and malware by numbers. This makes it a reliable and trustworthy and continuously updated source, focused on the threats targeting Portuguese citizens. This makes it a reliable and trustworthy and continuously updated source, focused on the threats targeting Portuguese citizens.

article thumbnail

Actors of Badness Exploit NCAA March Madness

SecureWorld News

that traditionally falls during our business day, and those who participate in viewing and playing in their "office pools" are susceptible to a variety of security threats, especially those dreaded phishing lures. Mobile phishing attacks are on the rise. After all, it's not called, 'March Madness' for nothing!

article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

Impersonators are known to use phishing , Business Email Compromise (BEC) and domain spoofing to lure victims, and they’re always looking for new ways to innovate. This is why a multi-layered approach that can block phishing sites (including HTTPS) in real time, is key for staying safe.

Scams 108
article thumbnail

12 Top Vulnerability Management Tools for 2023

eSecurity Planet

Discover security issues as part of the software development lifecycle (SDLC) as soon as possible. With over 450 pre-configured templates, speedily understand where you have threats. Reporting and troubleshooting capabilities can be customized to meet particular needs and are exportable in multiple formats. Key Differentiators.

Risk 103