Eyal is the VP of Customer Success at Cymulate. During the last 15 years Eyal performed in a number of critical roles in the information and cyber security fields, providing services for global organizations in a wide range of sectors.
On May 25, 2018, the EU General Data Protection Regulation will come into force. GDPR is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. In our blog of August 31 last year, we explained the various articles and implications of the new legislation. Organization have not been idle and are moving rapidly from GDPR awareness to GDPR compliance.
Don’t See Red - Opt for an Automated Red Team to Test Your Security Defenses For some time now, companies have copied a proven military concept to test their cybersecurity. This concept is simple: A Red Team consisting of cybersecurity pros attacking the organization’s network and the Blue Team must stop these attacks. Organizations normally have their Blue Team (IT manager, cybersecurity staff etc.) in place, but when it comes to the Red Team, it’s complicated. To test the organization’s.
The Four Horsemen of The Ransomware Apocalypse Keep Riding On Optimistic souls predicted last year that ransomware attacks had their heyday in 2017, so that we would see a decline in 2018. Bad news - this is not the case…The four horsemen of the ransomware apocalypse keep on riding, just changing their targets, tools, methods and tactics. The motive for ransomware remains the same: money. (A noted exception is the NotPetya ransomware attack which was aimed at paralyzing a nation’s economic.
Coming to a router near you - beware of Slingshot malware! Cybercrooks and cyberspooks never sleep, and their new “creations” keep popping up. One of the recent trends is targeting routers to cyberattack. Recently, the routers of Latvian manufacturer MikroTik were attacked in a highly sophisticated manner. The malware dubbed “Slingshot”, infected at least 100 computers worldwide. Using a multi-layered attack, the malware spies on PCs. Similar to the advanced backdoor Trojan Regin (which.
The Rising Costs of Cybercrime - Guess Who Pays The Ferryman? Over the last few years, cybercrime and espionage have caused damages that have reached $600 billion in 2017, which is about 0.8% of global GDP. This is a substantial increase from $445 billion in damages that was reported in 2014. Guess who pays for it in the end? We all do! Cybercrime hits targets around the world Cybercrime does not discriminate when it comes to nationalities; we could say that cybercrooks are equal opportunists..
Five Eyes Nations Peg Russia as the Brains behind Petya/NotPetya Remember Petya and NotPetya? Quick reminder: The initial version of the ucial infrastructure including its central bank, airport, metro transport, and even the Chernobyl power plant. The hackers used the Ukrainian accounting program MeDoc to spread the ransomware, and planted malware on the homepage of a prominent Ukraine-based news outlet. Fingers were pointing at Russia, especially since the ransom part of the attack seems.
Bad News - Attackers Are Launching Email Based Cyber Attacks As Never Before Just as in 2016 and 2017, cyber criminals, malicious hackers and nations keep on targeting email inboxes this year. Corporate email accounts have always been a favorable target and according to security experts, the BEC industry alone will grow during 2018, resulting in $9 billion in damages compared to $5.3 billion at the end of 2016. In its recent survey “What CISOs Worry About in 2018”, Ponemon found that almost 70%.
The Olympic Destroyer Hacks The Winter Olympics 2018 Swiping Files (Not Medals) In total, 91 national teams participated in the Winter Olympics 2018. The Olympians were not the only stars, major companies such as Samsung and Intel showed off with self-driving cars, virtual-reality viewing stations and super-fast video streaming. This made the Winter Olympics 2018 event the most high-tech Olympic Games in history. To illustrate, Intel launched 1,200 “shooting star” drones to create aerial images.
Since my previous post on the matter dated November 2nd 2017, Iran keeps on waging its cyberwarfare against its neighbors and (sadly enough) also its citizens. The increasing number of attacks launched by hackers backed by the Iranian regime and its proxies has shown a mix of sophisticated as well as very simple attacks. Countries such as Israel and Saudi Arabia are bombarded endlessly by Iran’s cyber army and its devious allies focusing on critical infrastructure and key personnel in the.
The fake invoice phishing scam has been around for quite some time and it pops in the wild every once in a while, in a different form. Overall, the nature of all those scams are in the end the same - a clever con to defraud victims. In January 2018, we saw a new version of fake invoice phishing scam wreaking havoc; this time targeting a large number of Italian organizations. In itself, the modus operandi of this attack was quite simple and did not require much sophistication from the.
Read More >
Subscribe to Our Blog
Stay up to date with the latest cybersecurity news and tips