Understanding Cyber Threats in Transport

The ENISA published its first cyber threat landscape report dedicated to the transport sector which maps and analyses cyber incidents in relation to aviation, maritime, railway, and road transport covering between January 2021 to October 2022.

Threat actors are experimenting with QR codes

Data collected by the HP Threat Research team shows that from Q2 2022, attackers have been diversifying their techniques to find new ways to breach devices and steal data using QR code scam campaigns.

Companies are moving forward with zero trust, but still report challenges

About 25% of respondents to a CyberRisk Alliance (CRA) survey who partially or fully implemented zero trust say they’ve had a hard time getting full buy-in from other departments when it comes to scaling these ideas across the enterprise.

Zero-Day Exploitation in 2022 Continued at an Elevated Pace

Mandiant researchers tracked 55 zero-day vulnerabilities that they judge were exploited in 2022. Although this count is lower than the record-breaking 81 zero-days exploited in 2021, it still represents almost triple the number from 2020.

Scammers can slip fake texts into legitimate SMS threads. Will a government crackdown stop them?

Last month, the Australian government announced plans to fight SMS-based scams by implementing an SMS sender ID registry. Under this system, organizations that want to SMS customers will first have to register their sender ID with a government body.

IT security spending to reach nearly $300 billion by 2026

Investments in cybersecurity are expected to reach nearly $300 billion in 2026, driven by the ongoing threat of cyberattacks, the demands of providing a secure hybrid work environment, and the need to meet data privacy and governance requirements.

Most mid-sized businesses lack cybersecurity experts, incident response plans

According to a Huntress report, 49% of mid-sized businesses plan to budget more for cybersecurity in 2023. 61% of mid-sized businesses do not have dedicated cybersecurity experts in their organization.

Meta Develops New Kill Chain Thesis

The Meta approach starts from the assumption that despite the asynchronous nature of attacks, there are still meaningful commonalities, especially where those commonalities can be abstracted from the platform or hardware being attacked.

BEC Volumes Double on Phishing Surge

The number of business email compromise (BEC) incidents doubled last year and replaced ransomware as the most prolific cybercrime category, according to Secureworks. Ransomware detections reportedly declined by 57%.

Meet Data Privacy Mandates With Cybersecurity Frameworks

Understanding the ongoing changes to data privacy regulations is challenging enough for CISOs and their teams. Implementing the needed changes as they occur only adds complexity and confusion.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags