Insights

67% of all malware in Q1 was delivered via HTTPS, so organizations without security solutions capable of inspecting encrypted traffic will miss two-thirds of incoming threats, according to WatchGuard...
Jun 25, 2020
317
1
By registering for Google Analytics accounts and injecting these accounts’ tracking code into the websites’ source code, attackers can collect users’ credit card details. About two dozen online...
Jun 23, 2020
0
0
Cybercriminals have been exploiting the increased popularity in video games during lockdown to launch attacks. In April, the daily number of blocked attempts to direct Kaspersky users to malicious...
Jun 22, 2020
224
1
Several malicious spam campaigns are distributing the Ursnif banking trojan, which caused it to jump up 19 places to 5th in the Top Malware list, doubling its impact on organizations worldwide,...
Jun 19, 2020
299
0
A correlation between the increased use of cloud services and collaboration tools, such as Cisco WebEx, Zoom, Microsoft Teams and Slack during the COVID-19 pandemic exists, along with an increase in...
May 28, 2020
584
4
Trust has eroded among criminal interactions, causing a switch to e-commerce platforms and communication using Discord, which both increase user anonymization, according to Trend Micro’s new data on...
May 27, 2020
333
0
Paying cybercriminals to restore data encrypted during a ransomware attack is not an easy and inexpensive path to recovery. In fact, the total cost of recovery almost doubles when organizations pay a...
May 13, 2020
353
1
Several COVID-19 related spam campaigns are distributing a new variant of the Agent Tesla remote access trojan, moving it up to 3rd place in the Index, impacting 3% of organizations worldwide,...
May 12, 2020
568
7
There has been significant growth of the lifespan of phishing attacks in the second half of 2019, according to Group-IB’s Computer Emergency Response Team (CERT-GIB).  This has resulted in the...
May 11, 2020
471
0
The rampant rise of ransomware persists, with 100% of respondents – who include ITOps, backup, DR and storage admins, application and workload owners in the U.S. – reporting that their company...
May 11, 2020
415
0
26.5% of all online transactions were fraud and abuse attempts in the first quarter of 2020, which is a 20% increase over the previous quarter, according to Arkose Labs’ Q2 2020 Fraud and Abuse...
Apr 29, 2020
430
2
Data is key to any organization. Every organization has data which is vital for their organizational growth. Most organizations build security around structured data which is mostly stored in the...
Jun 13, 2019
2,799
6
Some of the employee accounts of Wipro—one of India’s top IT services firms—may have been hacked due to an advanced phishing campaign, reported Reuters, quoting the company. The company had launched...
Apr 16, 2019
4,409
1
Cryptominers are still the most prevalent malware aimed at organizations globally although crytomining services, such as Coinhive have closed down, according to Check Point Research’s Global Threat...
Apr 12, 2019
2,914
1
The Reserve Bank of India (RBI) has imposed a monetary penalty of INR 10 million on Indian Bank  for contravention of RBI circular on Cyber Security Framework in banks issued by the regulator in...
Dec 11, 2018
3,880
2
Cybercriminals are evolving their attack methods to increase their success rates and to accelerate infections, according to Fortinet’s Global Threat Landscape Report. While ransomware continues to...
May 23, 2018
2,851
0
Dr. Rudra Murthy, former CISO at Ministry of Home Affairs, has taken up a new CISO role at Amazon Pay India. Dr. Murthy, also led the security role at Unique Identification Authority of India (...
Apr 03, 2018
7,936
2
With the General Data Protection Regulation (GDPR) taking effect May 25, 2018, businesses around the globe should be preparing accordingly. However, through a recent survey, Trend Micro...
Sep 07, 2017
4,446
0
With cybercrime on the increase, payment card security is increasingly a focus for companies and consumers alike. The Payment Card Industry Data Security Standard (PCI DSS) is there to help...
Aug 31, 2017
3,686
0
Despite the increasing number of data breaches and nearly 36.6 million data records being lost or stolen in India in 2016, the vast majority of IT professionals still believe perimeter security is...
Jul 11, 2017
2,415
1
Between 2015 and now, there have been an alarming 53.6% rise in the number of records stolen across the globe, according to the first State of Cybersecurity Report, 2017 by Wipro. Data breaches once...
Jun 15, 2017
2,531
0
Gartner highlights the top technologies for information security and their implications for security organizations in 2017.  The top technologies for information security are: Cloud Workload...
Jun 14, 2017
2,738
3
91% of businesses in India say their organization is at risk because of the complexity of business and it operations, which is above the APJ average of 85% and the worldwide average of 83%, according...
Jun 08, 2017
3,005
1
Cyberattacks on the government sector doubled in 2016, rising to 14% from 7% of all cybersecurity attacks in 2015, according to the Executive’s Guide to the NTT Security 2017 Global Threat...
May 10, 2017
2,527
0
A few years ago, no one would have heard of headless worms, machine-to-machine attacks, denial of service and two-faced malware. Today the threat of cybersecurity just exceeds everything else there...
Apr 28, 2017
4,122
0
The spend on cyber security will significantly grow over the next five years, but will still not be able to keep pace with threats posed by data breaches, according to a new research on cyber...
Apr 28, 2017
3,350
2
Hacking used to require a distinct set of skills and capabilities. These days, attack services are bought and sold via marketplaces on the Clearnet and Darknet—a phenomenon that’s closing the gap...
Apr 28, 2017
3,137
2
Even insurance companies aren't insured against cyber attacks.   On 7th April 2017, the Insurance Regulatory and Development Authority of India (IRDAI) issued a circular to CEOs and CMDs of all...
Apr 18, 2017
4,163
1
With Industry 4.0 becoming a reality, operational infrastructure, which used a lot of electronic technology but were so far isolated from the rest of organizational IT, are now getting connected to...
Apr 07, 2017
2,968
2
Enterprise security is undergoing a dramatic change in 2017. According to research firm Gartner, organizations are moving away from prevention-only approaches to focus more on detection and response...
Mar 14, 2017
2,672
0
As consumer privacy becomes a major issue, more and more consumer technology companies are trying to encrypt user data. Law enforcement agencies complain that this is leading to a situation where...
Feb 10, 2016
6,062
2
Here is what ISACA presents as five trends in cybersecurity that are expected to surface in 2016 1. Cyber-extortion Will Hit Wearables, Medical Devices and Gaming Systems  B2B use of the Internet of...
Dec 29, 2015
3,113
0
Less number of software security vulnerabilities were reported worldwide in 2015, as compared to 2014. However, vulnerabilities with a high level of severity increased by almost 16%, according to an...
Dec 29, 2015
5,505
0
Where do Indian chief information security officers (CISOs) stand in the organizational structure? Who do they report to? What is their relationship with other functional departments, especially IT...
Nov 23, 2015
9,033
3
Interpol's Dr Madan Mohan Oberoi highlighted various aspects of global cybersecurity scenario   The 8th CSO Summit of CSO Forum started in Chandigarh today. Among the speakers were chief information...
Nov 20, 2015
64,135
2
Indian consumers affected by cybercrime lost on average 29.6 hours and INR 16,558, finds a new study by Norton. This is in comparison to an average of 21 hours and INR INR 23,878 (USD 358) across 17...
Nov 19, 2015
3,374
2
Even as businesses are warming up to the idea of enterprise app stores and Apple iOS is considered to be one of the safest systems from security standpoint, an attack on Apple’s AppStore now raises...
Sep 22, 2015
6,419
1
Enterprises may be struggling to digitally transform themselves, but extortionists seem to have learnt the trick. Digital extortion—in the form of what is called ransomware—is now a real threat. And...
Sep 09, 2015
6,454
6
The research conducted by the NopSec Labs finds following insights... Remediation challenges are creating major security risks: While rapid vulnerability detection is at an all-time high, it still...
Jun 12, 2015
20,395
0
The survey from Enterprise Strategy Group and Intel Security found that security professionals are inundated with security incidents, averaging 78 investigations per organization in the last year,...
Apr 30, 2015
3,599
2
Intel Security announced a technology platform that could secure both legacy and new capabilities within the electric power grid. The new solution, Intel Security Critical Infrastructure Protection (...
Apr 15, 2015
4,208
3
CIO have watched data security rise on their list of priorities as the number of sophisticated, targeted cyberattacks continue to escalate. To educate audiences who are tasked with thwarting attacks...
Apr 14, 2015
3,432
0
Research from Accenture and the Ponemon Institute shows that proactive strategies can improve and expand on value delivered to the business.  Of the nearly 240 companies surveyed as part of the...
Apr 14, 2015
3,387
2
What’ new in ‘enterprise security’ today and how are businesses tackling rising security challenges?The first emerging trend is the realization by companies that they are intermediaries under the...
Mar 23, 2015
3,090
1
Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex, modular tools, and keeping well under the radar of increasingly...
Mar 13, 2015
3,759
1
The internet is changing the way we do business in India. Faster internet connectivity considered a luxury some years ago is spreading fast. More and more users are connected over 3G and 4G and this...
Feb 02, 2015
3,987
0
After two years of testing in real-world deployments and at West Coast Labs, digital security vendor TrustPipe emerged from stealth mode today to introduce its marker-based security technology –...
Dec 03, 2014
3,802
0
The growing presence of online personal information and new methods of accessing and transferring medical data are increasingly putting sensitive protected data at risk, according to the health care...
Dec 03, 2014
3,419
0
“When it comes to cyber, clients are wary that they are studying to fight the last war,” said Bill Stewart, a Senior Vice President with Booz Allen who leads the firm’s work in the financial services...
Nov 28, 2014
3,647
0