Please turn on your JavaScript for this page to function normally.
account
What can merchants do to avoid falling victim to large-scale ATO attacks?

Account Takeover (ATO) attacks happen when a bad actor gains access to a legitimate customer’s eCommerce store account and uses that account for fraud. The impact of ATO …

industrial
Only 36% of critical infrastructures have a high level of cyber resilience

Greenbone Networks revealed the findings of a research assessing critical infrastructure providers’ ability to operate during or in the wake of a cyberattack. The cyber …

world
With the threat landscape continuously changing, businesses must be ready for anything

Despite efforts by organizations to layer up their cyber defenses, the threat landscape is changing, attackers are innovating and automating their attacks, NTT reveals. The …

market
Businesses vulnerable to emerging risks have a gap in their insurance coverage

The majority of business decision makers are insured against traditional cyber risks, such as breaches of personal information, but most were vulnerable to emerging risks, …

ransomware
Paying the ransom = paying double

Paying cybercriminals to restore data encrypted during a ransomware attack is not an easy and inexpensive path to recovery, a Sophos survey reveals. In fact, the total cost of …

turn off
Unexpected downtime is crippling businesses, causing revenue losses

Unexpected downtime is a major challenge for SMBs today. The IT systems of nearly a quarter of SMBs have gone offline in the past year, according to a research from …

industry
Advanced attack scenarios and sabotage of smart manufacturing environments

Advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments, according to Trend Micro. Industry 4.0 Lab, the system that …

Business ideas
Cybersecurity and compliance: Vital priorities for MSPs and their clients

Cybersecurity and, to a lesser but growing extent, compliance are the most pressing priorities for MSPs and their customers this year, according to a Kaseya survey of 1,300 …

Work
Is remote work here to stay?

There’s no doubt COVID-19 set the remote work revolution on a fast track. And on that fast track, VPN usage soared to new heights with no signs of it slowing down. Companies …

gap
Total number of publicly reported breaches in Q1 2020 down 58% compared to last year

The total number of publicly reported breaches in Q1 2020 has decreased by 58% compared to the same period last year, Risk Based Security reveals. Publicly reported breaches …

password
Home workplaces introduce new risks, poor password hygiene

Entrust Datacard released the findings of its survey, which highlights the critical need to address data security challenges for employees working from home as a result of the …

ransomware
Ransomware on the rise, companies prioritizing disaster recovery

The rampant rise of ransomware persists, with 100% of respondents – who include ITOps, backup, disaster recovery and storage admins, application and workload owners in the …

Don't miss

Cybersecurity news