Eyal is the VP of Customer Success at Cymulate. During the last 15 years Eyal performed in a number of critical roles in the information and cyber security fields, providing services for global organizations in a wide range of sectors.
March's Cyberattacks In our monthly wrap-up, we cover the latest cyberattacks highlighting the attack methods and payloads used by malicious hackers and cybercriminals. Cybercrooks were very active in March 2019 successfully attacking Asus, Toyota, Jackson County, Earl Enterprise restaurants (e.g., Planet Hollywood), and various other industries. If we look at the Asus breach, attackers used the Asus’ software update system to distribute their malware to about 1 million Windows computers. It.
To keep on giving our users the necessary tools to boost their cybersecurity posture, the Cymulate Research Lab is constantly searching for new global attacks that can compromise organizations. By adding the latest in-the-wild detected threats, we keep our BAS platform up-to-date. A unique (and highly popular) feature in our platform is the Immediate Threat assessment, which allows organizations to test themselves if they are vulnerable against the latest threats, hours after they are.
In the last few years, APT attacks conducted by individual cybercriminals, organized crime and state-sponsored groups have become prevalent and sophisticated, bypassing standard security controls such as APT, or Advanced Persistent Threat, is a sophisticated attack in which a person or group attains access to a network and remains undetected for an extended period of time. The DarkHydrus APT Attack Let’s have a closer look at how APT threat actors operate by looking at a recent APT attack,.
Targeting politicians with cyber-attacks is not new, cybercriminals, hacktivists and rival nations have been doing this for many years. In 2016, Russian hackers allegedly tried to interfere in the 2016 US presidential election. The British parliament was targeted in mid-2017 in an attempt to access the accounts of hundreds of MPs, Lords, aides and staff by the suspected Russia and North Korea. During July 2018, hackers stole 1.5 million accounts patient data in Singapore including those of.
A Watering Hole attack is a method in which the attacker seeks to compromise a specific group of end users by infecting websites that members of that group are known to visit. The attacks have been adopted by criminals, APT groups and nation states alike and we see the amounts rising. The goal is to infect a victim's computer and gain access to the network within the victims's place of employment. Many conclude that these attacks are an alternative to Spear Phishing but are quite different..
Cyberattacks using the email vector has been the most widely used attack vector for the past few years, including this year. Threat actors are spreading ransomwares, trojans, malwares, and more with a simple email. In this blog, we will review the breakdown and the average penetration ratio per category of threats. During 2018, 858 worldwide organizations from various sectors mainly financial ones, including banks and insurance companies, turned to Cymulate to have their “cyberdefences”.
November's Cyberattacks In our monthly wrap-up, we cover the latest cyberattacks highlighting the attack methods and payloads used by malicious hackers and cybercriminals. The month ended with Marriott disclosing that it had been the victim of a large-scale data breach. The data of around 500 million customers who stayed at Starwood hotels (part of the Marriot group) for the last four years had been compromised. The breached data included some combination of name, mailing address, phone number,.
As the person in charge of your organization's security, you are having sleepless nights troubled by visions of becoming a victim of a destructive cyberattack or being trashed in the media after a breach. You worry about strengthening the security posture of your organization which requires implementing the right security solutions. The solutions are your only offense to protect the organization’s valuable assets, and it all rests on your shoulders.The fact that you have to work with a.
Whether you are a Cyber security professional or any other employee within an organization, you have probably heard the term “phishing” on and off over the past few years. You might have had face-to-face presentations, watched videos, seen slide decks, taken quizzes, or even had a few phishing drills to raise awareness to phishing attacks and prevent you from making the mistake of letting the Phishermen in. In a recently published survey checking the phishing awareness practices in.
Financial services firms are favorite targets for cyber criminals. The firms are a treasure trove of tradeable data varying from credit card credentials, customer information, and corporate data that can be abused or sold on the dark net. Compared to other industries, the financial sector still remains extremely vulnerable. Overall, the chance of a financial institution being breached is 300 times higher than that of other organizations. While US companies in general are attacked around 4.
Read More >
Subscribe to Our Blog
Stay up to date with the latest cybersecurity news and tips