The recent Forrester analytics survey says that companies spend an average of 37 days and of $2.4 million to detect and recover from a cybersecurity breach.
Hybrid warfare has altered the security landscape: cybersecurity expertsThe blurring of lines between the different modes of warfare and weaponisation of non-military means undermine the foundation of the state is one of the most significant security challenges today, experts said.0 5537
Instances of malware-delivering cloud apps nearly tripled in 2022
Netskope Threat Research: Malware-Delivering Cloud Apps Nearly Tripled in 2022.
ESET Research discovers espionage campaign targeting Android users
ESET Research discovers StrongPity APT group’s espionage campaign targeting Android users with trojanised Telegram app.
Building strong cybersecurity habits in 2023
Security awareness trainings should provide examples of real-world threats, educate users on what to do when faced with threats, help build positive cybersecurity habits, and gauge how users apply what they learn to real-world situations.
GCC premium aluminium producer relies on Vectra technology to prioritise threats
GCC’s leading premium aluminium producer relies on Vectra technology to automate detection, triage and prioritisation of threats.
Spam campaign steals users’ cryptocurrency
New spam campaign on a popular social media network steals users’ cryptocurrency.
What did cyber confrontation look like in 2022?
Kaspersky: what cyber confrontation looked like in 2022.
Kaspersky uncovers new spam campaign on Twitter that steals users’ cryptocurrency
Researchers from Kaspersky have discovered a new spam campaign that targets users’ cryptocurrency and spreads via direct messages on Twitter. …
APT actor disguises malware as venture capital funds
BlueNoroff renews attacks: APT actor adopts new malware techniques under the disguise of venture capital funds.
Top 5 SMB threats to watch out for in 2023
Cybercriminals will try to reach out to their victims using every way possible – through unlicensed software, phishing websites or emails, breaches in the business’s security network or even via massive DDoS attacks.