Remove threat-intelligence state-sponsored-cyberattacks-target-medical-research
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Erin: How has the cyber threat landscape evolved since you first got into cybersecurity?

article thumbnail

COVID-19 Has United Cybersecurity Experts, But Will That Unity Survive the Pandemic?

Krebs on Security

At least three major industry groups are working to counter the latest cyber threats and scams. Among the largest in terms of contributors is the COVID-19 Cyber Threat Coalition (CTC), which comprises rough 3,000 security professionals who are collecting, vetting and sharing new intelligence about new cyber threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Coronavirus-themed attacks April 19 – April 25, 2020

Security Affairs

Threat actors exploit the interest in the Coronavirus outbreak while infections increase worldwide, experts are observing new campaigns on a daily bases. April 19 – Cyberattack reports quadrupled during Coronavirus outbreak, FBI warns. April 23 – State-sponsored hackers are using COVID-19 lures, Google warns.

article thumbnail

What is Ransomware? Everything You Should Know

eSecurity Planet

Ransomware is the most feared cybersecurity threat and with good reason: Its ability to cripple organizations by locking their data is a threat like no other. The private key is only given to the target once the payment is given. But regardless of how it’s done, RaaS has dramatically expanded the ransomware threat.

article thumbnail

Securing Australia’s Critical Infrastructure

Security Boulevard

For more than a decade, cyberattacks on critical infrastructure have been growing as core systems, like power generation and distribution, have become more complex and reliant on networks of connected devices. In fact, over the past 18 months, we’ve seen a rapid acceleration in attacks on a wide range of infrastructure targets. .