Join us Wednesday, March 4 @ 19:00 (GMT), for a live demonstration of how Middlewave introduces a new-school approach to security awareness training and simulated phishing. See how easy it is to train and phish your users: Train your users with access to the world’s largest library of awareness training content and automated training campaigns with scheduled reminder emails. […]
Author Archives: Graham
A U.S. Natural Gas Operator Shuts Down for 2 Days After a Phishing Attack Infects it With Ransomware Dan Goodin at Ars Technica reported something worrisome: “A US-based natural gas facility shut down operations for two days after sustaining a ransomware infection that prevented personnel from receiving crucial real-time operational data from control and communication […]
Last December, a ransomware infection of Albany, New York-based accounting firm BST & Co. CPAs LLC exposed the confidential data of their customers, causing a data breach for one of their health care customers as well as other clients of the firm. Some of the data has shown up on the publicly accessible website of […]
Hackers have posted on an underground forum the personal information of 10.6 million MGM Resorts guests, ZDNet reports. The exposed information includes full names, home addresses, phone numbers, emails and dates of birth, according to the report, which claims the authenticity of the data has been verified with the help of a yet-to-be-launched monitoring firm called Under […]
Phishing is the process of attempting to acquire sensitive personal information such as account details e.g. usernames, passwords and credit card details by masquerading as a trustworthy source using emails which evade your organization’s spam filters. Emails claiming to be from your colleagues, social media sites, Microsoft etc. are commonly used to trick you into thinking […]
(February 14 & 17, 2020)Computer systems belonging to the Redcar and Cleveland Borough Council (UK) were infected with malware. The attack occurred on February 8, and as of February 26, were still “working with a reduced capacity”. The council has called in help from the National Cyber Security Centre (NCSC). The council has not said […]
According to the PCI Standards the goals of penetration testing are: 1.To determine whether and how a malicious user can gain unauthorized access to assets that affect the fundamentalsecurity of the system, files, logs and/or cardholder data. 2.To confirm that the applicable controls required by PCI DSS—such as scope, vulnerability management,methodology, and segmentation—are in place. […]
Cyber crime is more profitable than the global illegal drug trade. (Source: Cybersecurity Ventures) The profit from the illegal drug industry amounts to around $400 billion annually. For comparison, cyber criminals have earned a total of around $600 billion in 2018 and how long have cyber criminals been around compared to the drug trade? Enough said!!
73% of black hat hackers said traditional firewall and antivirus security is irrelevant or obsolete. (Source: Thycotic.com) According to the same survey, 80% of hackers say “humans are the most responsible for security breaches”.
- 1
- 2