The topic of zero-day exploits and exposed vulnerabilities is always trending within cybercriminal communities, both on clear web platforms and on the underground. From 280-character tweets circulated among cybercriminals on Twitter, to POC exploits released on clear web code repositories, to exploit kits and tools shared across the forums and markets of the deep and dark web, threat actor discourse revealing which vulnerabilities they plan to target is far from scarce.
- By Michael Angelo Zummo
- Aug 10, 2022
(ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – recently announced the (ISC)² One Million Certified in Cybersecurity℠ program, pledging to put one million people through its foundational Certified in Cybersecurity entry-level certification exam and education program for free.
IBM Security recently released the annual Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations.
The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners.
The business of cybercrime is rapidly increasing in scope and scale. The cost incurred by companies due to data breaches increased by nearly 10 percent from 2020 to 2021, meaning if the cost incurred by attacks was measured against the GDPs of all the nations of the world, it would be third largest, just lagging behind the U.S. and China.
- By David Ratner
- Jul 30, 2022
Fewer than 30% of small businesses in the United States view cybersecurity as a priority to invest in, according to data from Tech.co. This is despite a staggering 62% of small US businesses suggesting security breaches are a significant threat to their business growth.
A global IT security and compliance survey of 800+ IT professionals found that the rate of IT security incidents increases the more Microsoft 365 security features are used. Organizations using Microsoft 365 and that use 1 or 2 of its stock security features reported attacks 24.4% and 28.2% of the time respectively, while those that use 6 or 7 features reported attacks 55.6% and 40.8% of the time respectively.
It’s no secret that cyberattacks and data breaches are on the rise. You’ve likely heard about it on the news or may have experienced it first-hand. A commonality between these attacks becoming easier and more frequent might surprise you—simple passwords.
- By Dan DeMichele
- Jul 06, 2022
A new study from Juniper Research has found that global spend on identity & access management solutions will rise from $16 billion in 2022 to $26 billion by 2027; representing an absolute growth of 62% over the next 5 years.
While levels of vulnerability to cyberattacks can vary by industry, no organization—regardless of sector or size—should consider itself safe. The increased prevalence of ransomware, which cost U.S. companies more than $20 billion in 2021, has pushed the severity of the threat landscape to new heights
- By Jonathan Halstuch
- Jun 02, 2022
Your favorite bagel shop may have an amazing selection of sesame, garlic, parmesan, and blueberry bagels, friendly customer service, and that quirky vibe that you love. But it may not have the much-needed security in place to protect them and you against cybercrime.
- By Jerry Hsieh
- Jun 02, 2022
The Verizon Business 2022 Data Breach Investigations Report (2022 DBIR) examines an unprecedented year in cybersecurity history, and sheds light on some of the leading issues affecting the international cybersecurity landscape.
Global supply chain issues continue to persist to the point that they are circumventing earlier predictions that they would begin easing by now. They are getting worse, not better, due in part to prolonged Covid-19 lockdowns in parts of China and Russia’s invasion of Ukraine, which cut off their exports.
- By Robert Ackerman Jr.
- May 31, 2022
QuSecure Inc. has formally launched as the first company to offer an end-to-end, quantum resilient orchestration platform.
Zscaler, Inc. recently released the findings of its 2022 ThreatLabz Phishing Report that reviews 12 months of global phishing data from the Zscaler security cloud to identify key trends, industries and geographies at risk, and emerging tactics.
The Identity Theft Resource Center (ITRC), a nationally recognized nonprofit organization established to support victims of identity crime, released its U.S. data breach findings for the first quarter (Q1) of 2022.
The proliferation of cyber-offensive capabilities has been thoroughly discussed in recent years by academics and think tankers alike.
- By Omer Carmi
- May 05, 2022
Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).
- By Dave Krauthamer
- May 02, 2022
Organizations have an opportunity to reduce their third-party risk by clarifying whether they or their suppliers are responsible for supply chain risk management, according to new global research of 1400 cybersecurity decision makers by NCC Group.
Few sectors face higher regulation and compliance standards in the United States than the aviation industry.
- By Kevin Tomich
- Apr 01, 2022