KnowBe4 report on the most clicked phishing emails in Q3 2022.

KnowBe4 report on the most clicked phishing emails in Q3 2022.
Cybersecurity industry in the EU still lags behind world leaders, including the U.S. and Israel.
57 percent of IT decision-makers in Germany want to invest EU financial aid in security, according to CyberArk study.
Identity theft, extortion, social polarisation and physical consequences are some of the undesirable consequences that this new world could bring.
Can business even fend off cyberattacks by hostile states? We asked Bogdan "Bob" Botezatu, Director Threat Research & Reporting at Bitdefender, about this.
The cyber extortionists exploit a known vulnerability in a Windows graphics driver. They then manipulate drivers of anti-virus software. This way, the BlackByte group can access systems of its victims undisturbed.
Security specialist BrightCloud has analyzed 95 million endpoints and sensors. Every second one had to deal with at least one infection in the first half of the year.
Out of the box, Windows 11 allows only one failed SMB login attempt every two seconds. Microsoft hopes to reduce Windows' attractiveness to brute-force attacks.
The hacker gained access to vulnerability reports and shared screenshots of internal systems, the email dashboard, and Slack server.
Recent study by Mimecast highlights level of security threats in healthcare.
Auf der IKT-Sicherheitskonferenz 2022 in Wien präsentierte Dreamlab Technologies einen wissenschaftlichen Scan der Cyberlage der Nation.
The group, known as DEV-0270, exploits known vulnerabilities and is not only pursuing political or strategic goals. As an alternative to BitLocker, the group also relies on the open-source tool DiskCryptor.
Sophos Ransomware Report in Retail: 77 percent of retailers have been victims of a ransomware attack.
Samsung's US subsidiary is affected. The unknown perpetrators stole names, addresses and details of registered products. Samsung informs law enforcement and calls in a cybersecurity company.
BlackBerry study: Criminals can access home networks connected to corporate devices.
In his guest article, Yaroslav Rosomakho from Netskope explains how cybercriminals work and how companies can arm themselves against them.
The crypto-miner Nitrokod escapes detection by security researchers for years. However, according to Check Point, the infection route can also be used for more dangerous malware such as ransomware.
Trend Micro: Ransomware attacks on Linux and embedded systems in double digits.
Scams target potential investors in Germany, the Netherlands, the UK, Belgium, Portugal as well as other countries in Europe.
Enterprises are being highly targeted with sophisticated DDoS attacks. Critical payloads are being reached faster.
The cyber extortionists are active in the USA and Europe. They demand ransoms in the seven-figure range. When compromising networks, Zeppelin proceeds very carefully.
The top malware strains include remote access Trojans (RATs), banking Trojans, info stealers and ransomware.
Business decision-makers are unable to assess their digital attack surfaces due to complexity.
HP Wolf Security Report reveals new techniques and phishing lures used to deceive employees.
Groups LockBit, Hive and BlackCat compromised the network within about two weeks. Apparently, they each use the same hacked RDP connection. Only after the third attack the company approached Sophos for help.
Attractive target for ransomware groups as attacks can be life-threatening and ransom demands are more likely to be paid.
Unknown persons penetrate the company's network. Beforehand, they hacked the Google account of a Cisco employee and obtained VPN access data. The ransomware group Yanluowang claims responsibility for the attack.
Three quarters of respondents believe recent changes in working practices have had a negative impact on their company's cyber security.
More than 1.5 million victims decrypt their data for free thanks to Europol initiative. In the meantime, No More Ransom offers decryption tools for 165 ransomware variants.
"It's not worth paying", says Reiner Dresbach of Cybereason in his commentary on ransom demands after ransomware attacks.