Employees Within Hospitality Industry Are The Most Prone To Phishing Attacks

Today, KnowBe4,  the provider of the world’s largest security awareness training and simulated phishing platform, has released its Phishing By Industry Benchmarking Report 2019 which found, amongst large organisations, those within the Hospitality industry have the highest Phish-Prone Percentage (PPP) of 48 percent and were the most likely to fall victim to a phishing scam. In comparison, employees […]

Oregon DHS Hit By Monumental Phishing Attack, Compromising 645,000 Accounts

Fox News has released the article, regarding a recent phishing email breach at Oregon DHS, compromising approximately 645,000 accounts.  The email was sent to Oregon’s DHS employees on Jan. 8, 2019. Nine employees opened the email and clicked on a link that allowed the sender to access their email accounts.  The result was exposed data – contained mostly in […]

Trojan Hiding In Attached Microsoft Excel Docs

removing-a-trojan-virus

Microsoft is drawing attention to a cybercrime campaign that relies on Office features to compromise Windows systems. Earlier this month Microsoft warned that attackers were firing spam that exploited an Office flaw to install a trojan. The bug meant the attackers didn’t require Windows users to enable macros. However, a new malware campaign that doesn’t […]

Google Tracking

Coming up this summer, Google is expected to be introducing a new “auto-delete” tool that will get rid of data and will also be unveiling “Incognito Mode,” to the Google Maps app where users will be able to search locations without being tracked.   Google Map auto delete history your location https://t.co/W8ouPLfPc6 pic.twitter.com/hQL8d9HWyo — @ gamer […]

US Retaliated Against Iranian Spy Group’s Cyberstrike

Hackers Attacked US Companies after Pact

It has been reported that the US launched a cyber-attack on Iranian weapons systems on Thursday as President Trump pulled out of air strikes on the country. The cyber-attack disabled computer systems controlling rocket and missile launchers, and is reported to be in retaliation for the shooting down of a US drone as well as […]

(ISC)2 Research Report Indicates That Small Businesses May Not Be The Weakest Link In The Supply Chain

small businesses to boost their cyber security

Study reveals that cybersecurity staffing and best practices are bigger factors  than company size in assessing security risk associated with supply chain partners (ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – today released the findings from its Securing the Partner Ecosystem study, which surveyed more than 700 respondents at both small […]

Ransomware: Why Every Org Is A Bullseye

Christy Wyatt, CEO at Absolute:  The level of ransomware attacks continue to evolve, and are more sophisticated than ever. Hackers can simply disable security controls and tear down protection against vulnerabilities in their wake. In fact, seventy percent of all breaches are the result of known vulnerabilities that enterprises took too long to patch. Just as startling […]

Security Flaw In Dell SupportAssist Tool Puts Millions Of Windows Systems At Risk

It has been revealed that a Windows support tool bundled with Dell computers has a high-severity security hole that leaves millions of systems at risk of a privilege-escalation attack.  Critical DLL Hijacking Vulnerability in PC-Doctor For Windows Let Hackers Attack Hundreds of Million DELL Computers: A critical DLL hijacking vulnerability resides in PC-Doctor Dell Hardware Support Service […]

What Can Be Done About The Increasing Authenticity Of Hacked Email Reply Chains?

Phishing has been around in various forms since the 1990s, however, it’s clear that the popular mode of attack continues to evolve as cybersecurity defences improve. To subvert these improved defences, phishing tactics have become so sophisticated it can be difficult to spot a scam – particularly in the case of hijacked email reply chains. […]

Expert Comments On Android Cryptominer Bot

Google Flaw that could Grant Remote Access to Devices

A new botnet is abusing Android Debug Bridge (ADB) and SSH to capture & collect new Android devices to its network, according to Trend Micro.  Experts with Juniper Networks and OneSpan offer observations on mobile device vulnerability and what organizations and users can and can’t to improve device security.  Botnet Uses SSH and ADB to Create Android Cryptomining Army #Cryptominer #Botnethttps://t.co/sN705snkKy by […]