cyberattack
How data protection is evolving in a digital world
Companies are challenged with more complex hybrid IT environments. They are raising budgets to fend off cyberattacks and keep up as production environments continue to …
Attackers evolve strategies to outmaneuver security teams
Attackers are expected to broaden their targeting strategy beyond regulated verticals such as financial services and healthcare. Large corporations (41%) will be the top …
Attackers never let a critical vulnerability go to waste
GreyNoise Intelligence unveiled its research report that dives deep into the most significant threat detection events of the past 12 months. “When it comes to cybersecurity, …
Cybercriminals create new methods to evade legacy DDoS defenses
The number of DDoS attacks we see around the globe is on the rise, and that trend is likely to continue throughout 2023, according to Corero. We expect to see attackers deploy …
Enterprises waste money on identity tools they don’t use
Misguided enterprise investment in multiple identity tools is proving insufficient in defending against today’s threat landscape, according to One Identity. 96% of companies …
Modern technology and cyber recovery will intersect in the next generation of attacks
As technology continues to evolve for business and personal use, cybercriminals are also leveraging innovation in the next generation of attacks, according to Experian. …
Connected homes are expanding, so is attack volume
78% Americans report unsafe online behaviors that open them up to cyber threats, such as reusing or sharing passwords, skipping software updates and more – a 14% increase from …
5 cybersecurity trends accelerating in 2023
Netwrix has released key cybersecurity trends that will affect organizations of all sizes in 2023. Here are five specific trends that you need to be aware of: The business of …
What CISOs consider when building up security resilience
Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to Cisco. Researchers identified the top …
State-sponsored attackers actively exploiting RCE in Citrix devices, patch ASAP! (CVE-2022-27518)
An unauthenticated remote code execution flaw (CVE-2022-27518) is being leveraged by a Chinese state-sponsored group to compromise Citrix Application Delivery Controller (ADC) …
Deal with sophisticated bot attacks: Learn, adapt, improve
A computer program known as a “bot” acts as an agent for a user or another program or mimics human action. Bots are typically used to automate particular tasks so …
33% of attacks in the cloud leverage credential access
Elastic released the 2022 Elastic Global Threat Report, detailing the evolving nature of cybersecurity threats, as well as the increased sophistication of cloud and …