Days after announcing a security compromise, cloud-based identity and authentication management provider Okta said that an unknown threat actor had accessed files of 134 customers after an employee signed in to a personal Google profile on the Chrome browser of an Okta-managed laptop.
This latest Quarterly Threat Report (QTR) distils the trends, notable new behaviours, and unusual attacks we saw over the last quarter. Also utilizing previous threat reports to compare findings and point out patterns–and even provide some solutions for avoiding the latest threats.
By dissecting how attackers got...
Genetics testing firm 23andMe is investigating a data leak of ancestry DNA information for certain customers whose usernames and passwords were previously hacked on other websites. The company suspects a massive credential stuffing attack on individual accounts using recycled passwords and no MFA.
Netcraft purchased an online brand protection vendor to incorporate security analysts into the company's highly automated cybercrime takedown process. The deal will expedite the takedown of fraudulent websites by capitalizing on their joint knowledge of the global infrastructure provider landscape.
FICO research has found that macroeconomic factors can significantly impact fraud trends, and with inflation and fears of a recession looming, banks are facing new threats from fraudsters whose methods are becoming significantly more sophisticated. One of the areas most impacted is first-party fraud, where fraudsters...
Cybercriminals continue to rely on proven attack methods while developing new ways to infiltrate digital environments and break through your human defense layer.
But how can you reduce your organization’s attack surface? We looked at 12.5 million users across 35,681 organizations to find out.
In this webinar...
Search engine optimization poisoning attacks, which involve intentionally manipulating search results to lead users onto malware-laced websites, are on the rise in the healthcare sector, U.S. federal regulators warn. Users should watch for typosquatting, keyword stuffing, meta tagging and cloaking.
Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they’re more targeted, more cunning and more dangerous. And this enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more.
Join Roger Grimes, KnowBe4’s...
What does it look like when an attacker accesses your network, and how can you mitigate the threat before it becomes a crisis?
This eBook reveals the various ways a real-life attack played out within the environment of a healthcare business associate. It documents how the attack happened and the moves and...
Understanding and Defending Against AI-Generated Email Attacks
ChatGPT. Google Bard. DeepFaceLab.
Generative AI is all the rage, and for good reason. What used to take hours can now be done in minutes, and what used to take minutes can be done in seconds. Which is great for productivity in the right hands.
But...
Banks are facing unprecedented challenges in securing their digital ecosystems while maintaining cost efficiency. With cybercriminals increasingly targeting the financial industry, banks face risks to their reputation as trustworthy partners. With data breach costs averaging nearly $6 million per incident, banks...
While historically the origin of most business email compromise (BEC) attacks has been West Africa, residing in Nigeria certainly isn’t a requirement for BEC attackers. Indeed, the subject of this report is a sophisticated threat group based in Israel.
The group is unique in that they impersonate executives and...
Email is your most essential business tool—and today’s top malware delivery vector. This vital communications channel has become fertile ground for today's most damaging cyber threats and all kinds of fraud. Because email threats inherently target people, an effective cybersecurity program focuses on people first....
Bots have become an important tool for modern cybercrime. A bot is used somewhere in the attack cycle in more than three-quarters of security incidents. HUMAN Security co-founder and CEO Tamer Hassan called account takeover "the gateway drug to all other forms of fraud and abuse."
How Fraud and Financial Crime Affects Customer Trust in Banks: Insights from 4,000 Banking Customers.
The survey results revealed that many bank customers are unaware of the distinctions between various types of financial crimes and rely heavily on their banks for reimbursement. In many cases people are lulled into a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.