blog_hero_02

Blog

Cymulate Can Help You Comply With GDPR
Eyal Aharoni, August 31, 2017
Read More >
On May 25, 2018, the EU General Data Protection Regulation will come into force. It is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. As the examples in the table show, no organization is safe and the results of such a breach should not be underestimated. Date Victim Breach Fallout 2015 - 2017 Swedish Transport Agency The handling of.
Read More >
PCI Compliance with Cymulate - Keep Payment Data Safe
Eyal Aharoni, August 28, 2017
Read More >
Merchants and companies of all sizes accept and process a multitude of credit card payments. On the downside, this provides a treasure trove for cybercriminals. They go after the millions of stored, processed and transmitted cardholder data. The table below shows some of the most profitable breaches that happened in the last five years. Date Victim Breach Fallout March 24th - April 18th 2017 Chipotle POS systems in 2,250 restaurants were compromised ·   Fines based on the size of the.
Read More >
Helping Healthcare Providers To Keep Their Data HIPAA Compliant
Eyal Aharoni, August 21, 2017
Read More >
During the first half of 2017, cybercrooks were at it again. According to the U.S. Department of Health and Human Services, the sad balance stands at 149 breaches affecting a total of nearly 2.7 million individuals. The 5 Largest US Health Data Breaches in H1, 2017 Entity # Individuals Affected Breach Type Commonwealth Health 697,800 Theft by former employee Airway Oxygen 500,000 Hacker / Ransomware Urology Austin 279,663 Hacker / Ransomware Harrisburg Gastroenterology 93,323 Hacker
Read More >
Why a Breach and Attack Simulation Platform Should Be an Integral Part of Your Cybersecurity Arsenal
Eyal Aharoni, August 13, 2017
Read More >
Cyber-attacks are making cyberspace an increasingly hostile environment for organizations. Despite having security solutions in place, defending against breaches is becoming more and more difficult, as recent cyber-attacks such as WannaCry have shown. Organizations are investing heavily in cybersecurity, and will invest even more in the coming years. IDC predicts that worldwide revenues for security-related hardware, software and services will grow from $73.7b a year in 2016 to $100b by 2020, a.
Read More >
Web Applications Vulnerability Is Everyone’s Responsibility
Avihai Ben-Yossef, August 2, 2017
Read More >
When organizations worry about their cyber security, they focus on ransomware attacks, employees opening (spear) phishing emails or clicking on malicious banners and links on websites. But there is another danger that is often underestimated - the web applications of your own organization could harbor vulnerabilities and security issues. This happens more often than you think - “bad” coding is still a major concern as the HP Security Research’s Cyber Risk Report 2015 indicates: .
Read More >
What CopyKittens Can Teach Us About Cyber-security
Eyal Aharoni, July 26, 2017
Read More >
Thanks to the experts at ClearSky Cyber Security and Trend Micro, a highly professional cyber spy ring, known as CopyKittens, was exposed in an operation with the codename “Wilted Tulip”. The detailed report published on July 25th 2017, paints an alarming picture. CopyKittens has been active since 2013, maybe even longer, causing havoc worldwide. The group has been targeting government institutions, academic institutions, defense companies, municipal authorities, and subcontractors of the.
Read More >
Petya, NotPetya call it the way you like, it is still Ransomware!
Eyal Aharoni, June 28, 2017
Read More >
Tuesday June 27th, just a little over than a month had past since the Wannacry ransomware campaign and in just a few hours multiple reports of a worldwide outbreak regarding a new ransomware campaign, some say it is a new variant of "Petya” others call it “NotPetya”. The new Petya ransomware variant infections broke out beginning at the Ukraine and spread from there to other countries. This proliferation of this Ransomware is believed to begin with a malicious email containing a ransomware.
Read More >
Cyber-Crime Rising
Eyal Aharoni, June 25, 2017
Read More >
Cyber-Crime is on the Rise! As part of its annual routine, the FBI’s Internet Crime Complaint Center (IC3) released on June 21st 2017 its 2016 Internet Crime Report, describing the numbers and types of cyber-crimes reported to IC3. The report shows that during 2016, the IC3 received a total of 298,728 complaints with reported losses in excess of $1.3 billion. The report also shows that Business Email Compromise (BEC), ransomware attacks, tech support fraud, and extortion were the most common.
Read More >
Have You Been Phished Today?
Eyal Aharoni, June 12, 2017
Read More >
The rise of cyber-attacks on organizations via the email vector is continuously escalating. As we have seen recently, hospitals, transit companies, financial institutions, academic institutions, telecommunication companies and many others were all victims. Cyber criminals have become more advanced, sophisticated and dynamic than ever and they are constantly attacking irrespectively to geographical location or nationality, with the purpose of extracting valuable information, reaching personal.
Read More >
Academy Exposed: Cyber Attacker’s Preferred Target
Eyal Aharoni, June 6, 2017
Read More >
Cyber-attacks and information breaches within the academic sector have received much less media attention than attacks on health, financial and industrial sectors. Nevertheless, based on a number of reports since 2014, academic institutions are part of the 3 most targeted sectors. Furthermore, attacks against academic institutions have been around for over 3 decades, and they are not going away. In the past couple of years, institutes such as Harvard University, Greenwich University and.
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag