article thumbnail

$12M Ransomware Attack Hit Because Nobody Listened to the Security Team

SecureWorld News

Their security team developed a solid remediation plan, but couldn't convince leadership to prioritize the fixes. Six months of meetings and presentations led nowhere. I learned this lesson the hard way early in my career when I presented what I thought was an airtight case for a new endpoint security solution.

article thumbnail

March Madness Meets Cyber Mayhem: How Cybercriminals Are Playing Offense this Season

SecureWorld News

This annual college basketball bonanza presents a prime opportunity for scammers to capitalize on excitement, urgency, and, of course, the lure of easy money.

Scams 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Proofpoint Boosting Data Security with Normalyze Acquisition

Security Boulevard

Cybersecurity firm Proofpoint, which is eyeing an IPO in the next 18 months, is buying startup Normalyze to improve its data protection capabilities and mitigate the threat humans present in an increasingly fast-paced, interconnected, and AI-focus world.

article thumbnail

Artificial Intelligence meets real talk at IRISSCON 2024

BH Consulting

The result, as ever, was presentations strong on realism and common sense, short on sales hype and scaremongering. James Coker, reporting from the conference for Infosecurity Magazine, had this writeup of McArdle’s presentation. There was no doubting the one topic on almost everyone’s minds at IRISSCON 2024: AI.

article thumbnail

Managed detection and response in 2024

SecureList

The annual MDR analyst report presents insights based on the analysis of incidents detected by Kaspersky’s SOC team. Users are still the weakest link, making Security Awareness training an important focus for corporate information security planning.

Phishing 101
article thumbnail

News alert: SquareX discloses ‘Browser Syncjacking’ – a new attack to hijack browser

The Last Watchdog

Critically, the malicious extension only requires read/write capabilities present in the majority of browser extensions on the Chrome Store, including common productivity tools like Grammarly, Calendly and Loom, desensitizing users from granting these permissions.

article thumbnail

To empower, not intimidate: a new model for cybersecurity awareness

BH Consulting

In the webinar, Brian talked about moving ‘beyond fear’ to develop new awareness models that empower users, as this leads to more sustainable and effective cybersecurity behaviour. Brian referred to the Verizon Data Breach Investigations Report that’s considered a leading source of information for the security community.