cyber-security

How Will You Focus Your Security Spending in 2019?

As the person in charge of your organization's security, you are having sleepless nights troubled by visions of becoming a victim of a destructive cyberattack or being trashed in the media after a breach. You worry about strengthening the security posture of your organization which requires[...]

Abusing Microsoft Office Online Video

  **Updated Note: As of November 12th, 2018, Trend Micro has discovered an in-the-wild sample of this logical bug seen in the TROJ_EXPLOIT.AOOCAI, using it  to deliver the URSNIF information stealer (TSPY_URSNIF.OIBEAO).** Cymulate’s research team has discovered a way to abuse the Online Video[...]

Cybercrooks are Laughing All the Way from the Bank

  Financial services firms are favorite targets for cyber criminals. The firms are a treasure trove of tradeable data varying from credit card credentials, customer information, and corporate data that can be abused or sold on the dark net. Compared to other industries, the financial sector still[...]

Cybercriminals are Industrious When Hacking Industries

  In recent years, cyber-attacks on industrial control systems and critical infrastructure all together have been on the rise. A recent study by Bitkom shows that cyber-attacks cost the German industry almost $50 billion. Those attacks are not limited to Europe’s strong economy. Hackers are known[...]

Cybercriminals Have an Unhealthy Appetite for Medical Data

  Cybercriminals just love targeting healthcare organizations and have been doing it quite often for many years. As can be seen on the table below, during the past couple of months cybercriminals have been working hard on these types of targets. where they hit with ransomware attacks or breach to[...]

Academia Up for Grabs

Academia is Still a Preferred Target for Cyberattacks. In our blog post of June 6 last year, we wrote that although the attacks in the academic sector had received much less media attention than those in other sectors, academic institutions have been favorite targets of cybercriminals for over 3[...]

Are You Ready for the Next Cyber-Attack?

Cyber-crooks are masters of crime constantly developing, testing and fine-tuning their techniques to mine valuable and sensitive information for their own profit. As such, cyber-attacks come in a wide range of shapes and forms. To illustrate, cyber-criminals use: Advanced Persistent Threat[...]

Leveraging Cyber Simulation for M&A

Why Cybersecurity Is Critical for a Successful M&A In its “Cybersecurity Is Critical to the M&A Due Diligence Process” research note, Gartner points out that the M&A process is complicated by the inability to integrate and manage the cybersecurity practices of both companies. As part of the due[...]

Your Own Red Army

Don’t See Red - Opt for an Automated Red Team to Test Your Security Defenses For some time now, companies have copied a proven military concept to test their cybersecurity. This concept is simple: A Red Team consisting of cybersecurity pros attacking the organization’s network and the Blue Team[...]

Game of Ransomware

The Four Horsemen of The Ransomware Apocalypse Keep Riding On Optimistic souls predicted last year that ransomware attacks had their heyday in 2017, so that we would see a decline in 2018. Bad news - this is not the case…The four horsemen of the ransomware apocalypse keep on riding, just changing[...]