Remove vulnerabilities-threats will-this-be-the-year-of-the-branded-cybercriminal-
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

A look back at the cybersecurity landscape in 2023 rings all-too familiar: cyber threats rapidly evolved and scaled up , just as they have, year-to-year, for the past 20 years. At the same time, we’ll see cybercriminals pivot to the use of QR codes and images to sidestep natural language processing (NLP) defenses.

article thumbnail

Ukrainian Police Nab Six Tied to CLOP Ransomware

Krebs on Security

Authorities in Ukraine this week charged six people alleged to be part of the CLOP ransomware group , a cybercriminal gang said to have extorted more than half a billion dollars from victims. Some of CLOP’s victims this year alone include Stanford University Medical School , the University of California , and University of Maryland.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

As 2023 draws to an end and cybersecurity budgeting is nearly complete, it helps to consider the year’s events and try to predict next year’s trends. After receiving input from industry experts and doing my own analysis of the year’s driving forces, I identified five major cybersecurity trends.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

KrebsOnSecurity turns 13 years old today. Some of that work is highlighted in the 2022 Year in Review review below. Here’s a look at some of the more notable cybercrime stories from the past year, as covered by KrebsOnSecurity and elsewhere. Heck, I’ve been doing this so long I briefly forgot which birthday this was!

Passwords 225
article thumbnail

CyberheistNews Vol 13 #11 [Heads Up] Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears

KnowBe4

Blog post with links: [link] [New PhishER Feature] Immediately Add User-Reported Email Threats to Your M365 Blocklist Now there's a super easy way to keep malicious emails away from all your users through the power of the KnowBe4 PhishER platform! I'm giving you a short extract of the story and the link to the whole article is below.

article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

It has only been in the past four years or so that white hat researchers and black hat hackers have gravitated over to this unguarded terrain – and begun making hay. Vulnerability research took on a life of its own. Vulnerability research took on a life of its own. Locking down firmware. telecoms by Chinese tech giant Huawei.

article thumbnail

Intro to phishing: simulating attacks to build resiliency

Security Affairs

Phishing attacks are a major threat to organizations, they remain a perennial choice of cybercriminals when it comes to hacking their victims. The infographic below outlines the most common types of phishing attacks used against individuals or businesses. The eight most common forms of phishing-based cyberattacks.