Remove resources research-reports annual-threat-report
article thumbnail

Cybercriminals leaked massive volumes of stolen PII data from Thailand in Dark Web

Security Affairs

Resecurity researchers warn of massive leak of stolen Thai personally identifiable information (PII) on the dark web by cybercriminals. There are reports of cybercriminals, one known in the shadowy corners of the Dark Web as Naraka, circulating large amounts of stolen personal identifiable information (PII) of Thai citizens.

article thumbnail

North Korean cyber attacks income and free VPN data breach

CyberSecurity Insiders

According to a report published by Japanese news resource Nikkei, it has been revealed that the North Korean government is actively engaging in cyber attacks on the digital infrastructure of its adversaries. Nikkei’s report is based on estimates provided by sources from South Korea.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nearly Half of Cybersecurity Professionals Consider Quitting

SecureWorld News

While there are many positives to look at—such as improved detection and reporting and increased communication between the public and private sector—we still have such a long way to go in a relatively new industry. France, and Germany, whose organizations all have more than 1,000 employees and annual revenues above $500M.

article thumbnail

Presenting the Security Outcomes Study, Volume 2

Cisco Security

Our latest cybersecurity research study suggests that this is not only true but is also a tangible reality for organizations that choose to follow some practical steps. Over the past nine months, we’ve orchestrated in-depth data analysis against our very own prior research—the first annual Security Outcomes Study. program-level?outcomes.

article thumbnail

Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps

SecureWorld News

CyCognito has released its semi-annual State of External Exposure Management Report , revealing a staggering number of vulnerable public cloud, mobile, and web applications exposing sensitive data, including unsecured APIs and personally identifiable information (PII). This minimizes the potential exposure of PII.

Mobile 92
article thumbnail

NIS2

Centraleyes

To enhance Europe’s resilience against existing and emerging cyber threats, the NIS2 Directive introduces new requirements and obligations for organizations in four key areas: risk management, corporate accountability, reporting obligations, and business continuity. NIS2 is a high-level directive, strengthening cybersecurity.

article thumbnail

Why BYOD Is the Favored Ransomware Backdoor

eSecurity Planet

Ransomware remains just one of many different threats and as security teams eliminate key vectors of attack, adversaries will shift tactics. Unmanaged devices consist of any device that connects to the network, cloud resources, or other assets without corporate-controlled security. Which Unmanaged Devices Do Attackers Use?