blog_hero_02

Blog

The Most Malicious Threat Actors Using Email
Eyal Aharoni, December 13, 2018
Read More >
Cyberattacks using the email vector has been the most widely used attack vector for the past few years, including this year. Threat actors are spreading ransomwares, trojans, malwares, and more with a simple email. In this blog, we will review the breakdown and the average penetration ratio per category of threats.   During 2018, 858 worldwide organizations from various sectors mainly financial ones, including banks and insurance companies, turned to Cymulate to have their “cyberdefences”.
Read More >
November Cyberattacks Wrap-up
Eyal Aharoni, December 4, 2018
Read More >
November's Cyberattacks In our monthly wrap-up, we cover the latest cyberattacks highlighting the attack methods and payloads used by malicious hackers and cybercriminals. The month ended with Marriott disclosing that it had been the victim of a large-scale data breach. The data of around 500 million customers who stayed at Starwood hotels (part of the Marriot group) for the last four years had been compromised. The breached data included some combination of name, mailing address, phone number,.
Read More >
A Guide to Stay Cybersafe This Holiday Season
Eyal Aharoni, November 22, 2018
Read More >
Cymulate wishes you a cybersafe Holiday Season! The holiday season is a time of joy and celebration, and as we all know, lots of shopping. With Black Friday, Cyber Monday, and Christmas shopping, the amount of shopping drastically increases, specifically online shopping. In a report released by Deloitte, analysts predict that in 2018, 60% of consumers will make their purchases online and over half of holiday spending is anticipated to take place online. It’s a great season for online retailers,.
Read More >
How Will You Focus Your Security Spending in 2019?
Eyal Aharoni, November 20, 2018
Read More >
As the person in charge of your organization's security, you are having sleepless nights troubled by visions of becoming a victim of a destructive cyberattack or being trashed in the media after a breach. You worry about strengthening the security posture of your organization which requires implementing the right security solutions.  The solutions are your only offense to protect the organization’s valuable assets, and it all rests on your shoulders.The fact that you have to work with a.
Read More >
The Top Cybersecurity Trends from 2018 and Predictions for 2019
Eyal Wachsman, November 19, 2018
Read More >
As this year is coming to a close, we look back at the year in review. In 2018, cybercriminals succeeded to carry out a larger number of cyberattacks and data breaches than any previous year.   The 6 Big Cyber Trends of 2018: Trend #1 – Email Attacks Remain Popular Trend #2 – Cryptojacking and Crypto Hijacking Trend #3 – Zero-Day and Fileless Attacks Trend #4 – Ransomware Keeps Paying Off Trend #5 – Verticals and Industries Remain Prime Targets Trend #6 – Law, Crime, and Punishment   In this.
Read More >
Phishing Attacks: The Phishermen Who Might Reel You In
Eyal Aharoni, October 29, 2018
Read More >
Whether you are a Cyber security professional or any other employee within an organization, you have probably heard the term “phishing” on and off over the past few years. You might have had face-to-face presentations, watched videos, seen slide decks, taken quizzes, or even had a few phishing drills to raise awareness to phishing attacks and prevent you from making the mistake of letting the Phishermen in. In a recently published survey checking the phishing awareness practices in.
Read More >
Abusing Microsoft Office Online Video
Avihai Ben-Yossef, October 25, 2018
Read More >
  **Updated Note: As of November 12th, 2018, Trend Micro has discovered an in-the-wild sample of this logical bug seen in the TROJ_EXPLOIT.AOOCAI, using it  to deliver the URSNIF information stealer (TSPY_URSNIF.OIBEAO).** Cymulate’s research team has discovered a way to abuse the Online Video feature on Microsoft Word to execute malicious code (Read the press release here). Attackers could use this for malicious purposes such as phishing, as the document will show the embedded online video.
Read More >
Cybercrooks are Laughing All the Way from the Bank
Eyal Aharoni, October 19, 2018
Read More >
  Financial services firms are favorite targets for cyber criminals. The firms are a treasure trove of tradeable data varying from credit card credentials, customer information, and corporate data that can be abused or sold on the dark net. Compared to other industries, the financial sector still remains extremely vulnerable. Overall, the chance of a financial institution being breached is 300 times higher than that of other organizations. While US companies in general are attacked around 4.
Read More >
Cybercriminals are Industrious When Hacking Industries
Eyal Aharoni, October 10, 2018
Read More >
  In recent years, cyber-attacks on industrial control systems and critical infrastructure all together have been on the rise. A recent study by Bitkom shows that cyber-attacks cost the German industry almost $50 billion. Those attacks are not limited to Europe’s strong economy. Hackers are known to have manipulated critical industrial safety systems to cause physical damage. This poses a major question: Which sectors are the most critical and at risk? The United States Home Land Security (HLS).
Read More >
Cybercriminals Have an Unhealthy Appetite for Medical Data
Eyal Aharoni, September 26, 2018
Read More >
  Cybercriminals just love targeting healthcare organizations and have been doing it quite often for many years. As can be seen on the table below, during the past couple of months cybercriminals have been working hard on these types of targets. where they hit with ransomware attacks or breach to exfiltrate medical records which they can monetize. These medical records are a treasure trove of information that is easy to sell on the dark web. In contrast to e.g., financial institutions,.
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag