Eyal is the VP of Customer Success at Cymulate. During the last 15 years Eyal performed in a number of critical roles in the information and cyber security fields, providing services for global organizations in a wide range of sectors.
You might think that we have become good at identifying phishing attacks today, but that’s a dangerous assumption. The frightening truth is, that around 90% of all cyberattacks start with a phishing or spear phishing email. Yes, almost all of us can spot a dubious request from a “Nigerian prince” asking us for our bank details a mile away, but phishers have improved their game to keep on outsmarting us. With the US tax season in full gear, cybercrooks are sending phishing emails to get.
Yes, the US is under cyberattacks - constantly Being a rich superpower comes with a price, as the US found out the hard way. Especially American healthcare and financial organizations remain popular targets, since they are rich pickings for cybercrooks. Infrastructure is another favorite, as are municipalities which have often outdated cyber defenses. Looking back, 2017 which was a peak year with 1.57B data breaches and close to 179M data records exposed (Source: Statistica). Although it’s.
Risk Score KPI Lets Your SOC Rock Your Cybersecurity In the good old days, a security operations center (SOC) was basically a room full of live camera feeds to let the organization see what’s going and to take action if necessary. It started with government agencies, defense departments, followed by financial institutions. Today, is also used for managed services. Its purpose is still the same - being a centralized hub for continuously monitoring of and managing the security status of an.
On May 25, 2018, the EU General Data Protection Regulation will come into force. GDPR is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. In our blog of August 31 last year, we explained the various articles and implications of the new legislation. Organization have not been idle and are moving rapidly from GDPR awareness to GDPR compliance.
Don’t See Red - Opt for an Automated Red Team to Test Your Security Defenses For some time now, companies have copied a proven military concept to test their cybersecurity. This concept is simple: A Red Team consisting of cybersecurity pros attacking the organization’s network and the Blue Team must stop these attacks. Organizations normally have their Blue Team (IT manager, cybersecurity staff etc.) in place, but when it comes to the Red Team, it’s complicated. To test the organization’s.
The Four Horsemen of The Ransomware Apocalypse Keep Riding On Optimistic souls predicted last year that ransomware attacks had their heyday in 2017, so that we would see a decline in 2018. Bad news - this is not the case…The four horsemen of the ransomware apocalypse keep on riding, just changing their targets, tools, methods and tactics. The motive for ransomware remains the same: money. (A noted exception is the NotPetya ransomware attack which was aimed at paralyzing a nation’s economic.
Coming to a router near you - beware of Slingshot malware! Cybercrooks and cyberspooks never sleep, and their new “creations” keep popping up. One of the recent trends is targeting routers to cyberattack. Recently, the routers of Latvian manufacturer MikroTik were attacked in a highly sophisticated manner. The malware dubbed “Slingshot”, infected at least 100 computers worldwide. Using a multi-layered attack, the malware spies on PCs. Similar to the advanced backdoor Trojan Regin (which.
The Rising Costs of Cybercrime - Guess Who Pays The Ferryman? Over the last few years, cybercrime and espionage have caused damages that have reached $600 billion in 2017, which is about 0.8% of global GDP. This is a substantial increase from $445 billion in damages that was reported in 2014. Guess who pays for it in the end? We all do! Cybercrime hits targets around the world Cybercrime does not discriminate when it comes to nationalities; we could say that cybercrooks are equal opportunists..
Five Eyes Nations Peg Russia as the Brains behind Petya/NotPetya Remember Petya and NotPetya? Quick reminder: The initial version of the ucial infrastructure including its central bank, airport, metro transport, and even the Chernobyl power plant. The hackers used the Ukrainian accounting program MeDoc to spread the ransomware, and planted malware on the homepage of a prominent Ukraine-based news outlet. Fingers were pointing at Russia, especially since the ransom part of the attack seems.
Bad News - Attackers Are Launching Email Based Cyber Attacks As Never Before Just as in 2016 and 2017, cyber criminals, malicious hackers and nations keep on targeting email inboxes this year. Corporate email accounts have always been a favorable target and according to security experts, the BEC industry alone will grow during 2018, resulting in $9 billion in damages compared to $5.3 billion at the end of 2016. In its recent survey “What CISOs Worry About in 2018”, Ponemon found that almost 70%.
Read More >
Subscribe to Our Blog
Stay up to date with the latest cybersecurity news and tips