Insights

The Trickbot and Emotet trojans continue to rank as the top two most prevalent malware in October, and that the trojans have been responsible for the sharp increase in ransomware attacks against...
Nov 09, 2020
385
0
In Q3, Microsoft was the most frequently targeted brand by cybercriminals, soaring from fifth place (relating to 7% of all brand phishing attempted globally in Q2 of 2020) to the top of the ranking,...
Oct 20, 2020
460
0
Coronavirus-related email subjects remain the biggest threat, according to KnowBe4’s Q3, 2020 phishing report. Covering the entire third quarter, simulated phishing tests with a message related to...
Oct 16, 2020
407
0
An updated version of Valak malware has entered Checkpoint Research’s Global Threat Index for the first time, ranking as the 9th most prevalent malware in September 2020. First observed in late 2019...
Oct 08, 2020
500
0
An Advanced Persistent Threat (APT) espionage campaign has been uncovered recently by Kaspersky’s researchers that use a very rarely seen type of malware known as a firmware bootkit. The new malware...
Oct 06, 2020
298
0
Attacks against industrial organizations always carry the potential to be particularly devastating, both in terms of disruption to production and financial losses. In addition, attacks against...
Sep 25, 2020
462
0
Sanctions refer to notifications issued by entities and/or governments that alert and/or prohibit organizations/individuals from carrying out financial transactions with certain people/organizations...
Sep 18, 2020
351
0
Ripple20 vulnerabilities can cause a massive impact if affected software goes undetected and unpatched, according to ExtraHop’s study. Analyzing data across its customer base, ExtraHop threat...
Sep 14, 2020
534
0
Many organizations choose Linux for strategically important servers and systems, not least because this operating system is thought to be safer and less prone to cyberthreats than the far more...
Sep 11, 2020
541
0
46% of consumers feel comfortable sharing streaming services with their housemates. However, a third (32%) are unsure about the safety of their accounts because they do not know about their...
Aug 31, 2020
609
0
A new Android spyware application is being distributed by Transparent Tribe, a prolific APT group, in India under the guise of adult content and official COVID-19 applications, according to Kaspersky...
Aug 27, 2020
468
0
As the COVID-19 pandemic spread rapidly in the first half of 2020, many organizations were required to shift to telework practically overnight as teams around the globe were asked to stay home....
Aug 24, 2020
478
0
Phishing attacks are becoming increasingly more targeted, according to Kaspersky’s Q2, 2020 report. A number of new tricks have also been found - from HR dismissal emails to attacks, disguised as...
Aug 11, 2020
591
0
Almost a third (30%) of cyberattacks investigated by the Kaspersky Global Emergency Response team in 2019 involved legitimate remote management and administration tools. As a result, attackers can...
Aug 10, 2020
285
0
After a five-month absence, Emotet has surged back to 1st place in Check Point Software Technologies’ latest Global Threat Index for July 2020, impacting 5% of organizations globally. Since February...
Aug 10, 2020
366
0
Criminal businesses need hosting services and cybersecurity protections too, according to Trend Micro’s study. The study analyzes the market for underground hosting services and details how and where...
Jul 27, 2020
396
0
Consumers need to be ready for a major new wave of attacks attempting to compromise their home routers for use in IoT botnets, according to a Trend Micro research. The report urges users to take...
Jul 17, 2020
508
0
67% of all malware in Q1 was delivered via HTTPS, so organizations without security solutions capable of inspecting encrypted traffic will miss two-thirds of incoming threats, according to WatchGuard...
Jun 25, 2020
803
1
By registering for Google Analytics accounts and injecting these accounts’ tracking code into the websites’ source code, attackers can collect users’ credit card details. About two dozen online...
Jun 23, 2020
0
0
Cybercriminals have been exploiting the increased popularity in video games during lockdown to launch attacks. In April, the daily number of blocked attempts to direct Kaspersky users to malicious...
Jun 22, 2020
520
1
Several malicious spam campaigns are distributing the Ursnif banking trojan, which caused it to jump up 19 places to 5th in the Top Malware list, doubling its impact on organizations worldwide,...
Jun 19, 2020
611
0
A correlation between the increased use of cloud services and collaboration tools, such as Cisco WebEx, Zoom, Microsoft Teams and Slack during the COVID-19 pandemic exists, along with an increase in...
May 28, 2020
1,037
4
Trust has eroded among criminal interactions, causing a switch to e-commerce platforms and communication using Discord, which both increase user anonymization, according to Trend Micro’s new data on...
May 27, 2020
783
1
Paying cybercriminals to restore data encrypted during a ransomware attack is not an easy and inexpensive path to recovery. In fact, the total cost of recovery almost doubles when organizations pay a...
May 13, 2020
593
1
Several COVID-19 related spam campaigns are distributing a new variant of the Agent Tesla remote access trojan, moving it up to 3rd place in the Index, impacting 3% of organizations worldwide,...
May 12, 2020
3,533
33
There has been significant growth of the lifespan of phishing attacks in the second half of 2019, according to Group-IB’s Computer Emergency Response Team (CERT-GIB).  This has resulted in the...
May 11, 2020
757
0
The rampant rise of ransomware persists, with 100% of respondents – who include ITOps, backup, DR and storage admins, application and workload owners in the U.S. – reporting that their company...
May 11, 2020
627
0
26.5% of all online transactions were fraud and abuse attempts in the first quarter of 2020, which is a 20% increase over the previous quarter, according to Arkose Labs’ Q2 2020 Fraud and Abuse...
Apr 29, 2020
876
2
Data is key to any organization. Every organization has data which is vital for their organizational growth. Most organizations build security around structured data which is mostly stored in the...
Jun 13, 2019
3,616
6
Some of the employee accounts of Wipro—one of India’s top IT services firms—may have been hacked due to an advanced phishing campaign, reported Reuters, quoting the company. The company had launched...
Apr 16, 2019
4,775
1
Cryptominers are still the most prevalent malware aimed at organizations globally although crytomining services, such as Coinhive have closed down, according to Check Point Research’s Global Threat...
Apr 12, 2019
3,413
1
The Reserve Bank of India (RBI) has imposed a monetary penalty of INR 10 million on Indian Bank  for contravention of RBI circular on Cyber Security Framework in banks issued by the regulator in...
Dec 11, 2018
4,486
2
Cybercriminals are evolving their attack methods to increase their success rates and to accelerate infections, according to Fortinet’s Global Threat Landscape Report. While ransomware continues to...
May 23, 2018
3,086
0
Dr. Rudra Murthy, former CISO at Ministry of Home Affairs, has taken up a new CISO role at Amazon Pay India. Dr. Murthy, also led the security role at Unique Identification Authority of India (...
Apr 03, 2018
9,091
2
With the General Data Protection Regulation (GDPR) taking effect May 25, 2018, businesses around the globe should be preparing accordingly. However, through a recent survey, Trend Micro...
Sep 07, 2017
4,771
0
With cybercrime on the increase, payment card security is increasingly a focus for companies and consumers alike. The Payment Card Industry Data Security Standard (PCI DSS) is there to help...
Aug 31, 2017
4,211
2
Despite the increasing number of data breaches and nearly 36.6 million data records being lost or stolen in India in 2016, the vast majority of IT professionals still believe perimeter security is...
Jul 11, 2017
2,594
1
Between 2015 and now, there have been an alarming 53.6% rise in the number of records stolen across the globe, according to the first State of Cybersecurity Report, 2017 by Wipro. Data breaches once...
Jun 15, 2017
2,767
0
Gartner highlights the top technologies for information security and their implications for security organizations in 2017.  The top technologies for information security are: Cloud Workload...
Jun 14, 2017
3,011
3
91% of businesses in India say their organization is at risk because of the complexity of business and it operations, which is above the APJ average of 85% and the worldwide average of 83%, according...
Jun 08, 2017
3,294
1
Cyberattacks on the government sector doubled in 2016, rising to 14% from 7% of all cybersecurity attacks in 2015, according to the Executive’s Guide to the NTT Security 2017 Global Threat...
May 10, 2017
2,694
0
A few years ago, no one would have heard of headless worms, machine-to-machine attacks, denial of service and two-faced malware. Today the threat of cybersecurity just exceeds everything else there...
Apr 28, 2017
4,700
0
The spend on cyber security will significantly grow over the next five years, but will still not be able to keep pace with threats posed by data breaches, according to a new research on cyber...
Apr 28, 2017
3,581
2
Hacking used to require a distinct set of skills and capabilities. These days, attack services are bought and sold via marketplaces on the Clearnet and Darknet—a phenomenon that’s closing the gap...
Apr 28, 2017
3,367
2
Even insurance companies aren't insured against cyber attacks.   On 7th April 2017, the Insurance Regulatory and Development Authority of India (IRDAI) issued a circular to CEOs and CMDs of all...
Apr 18, 2017
4,735
1
With Industry 4.0 becoming a reality, operational infrastructure, which used a lot of electronic technology but were so far isolated from the rest of organizational IT, are now getting connected to...
Apr 07, 2017
3,316
2
Enterprise security is undergoing a dramatic change in 2017. According to research firm Gartner, organizations are moving away from prevention-only approaches to focus more on detection and response...
Mar 14, 2017
2,825
0
As consumer privacy becomes a major issue, more and more consumer technology companies are trying to encrypt user data. Law enforcement agencies complain that this is leading to a situation where...
Feb 10, 2016
6,510
2
Here is what ISACA presents as five trends in cybersecurity that are expected to surface in 2016 1. Cyber-extortion Will Hit Wearables, Medical Devices and Gaming Systems  B2B use of the Internet of...
Dec 29, 2015
3,260
0
Less number of software security vulnerabilities were reported worldwide in 2015, as compared to 2014. However, vulnerabilities with a high level of severity increased by almost 16%, according to an...
Dec 29, 2015
5,725
0