New Zealand's leading source of cybersecurity and threat news
These search results are from across the Techday network of sites
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work? The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.
Plugging the gaps: Australian organisations are leaving their defence barriers wide open
Cybercriminals are are walking through the gaping holes in Australia’s organisational defences – gaps that leadership teams don’t even realise are there.
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.
Fortinet: Risk and compliance in a hyperscaling world
Your challenge is to minimise risk whilst embracing the promise of digital transformation.
2020 saw a surge in malware, ransomware and botnets - report
“There has never been a clearer picture than now, of why organisations need to adjust their defence strategies going forward to fully take into account the network perimeter extending into the home."
Sophos deconstructs Dharma, the 'fast food franchise' ransomware
"Dharma is fast-food franchise ransomware: widely and easily available to just about anyone,” says a Sophos threat researcher.
Deal triple damage against ransomware with these 3 ultimate strategies
The three main strategies you need to win every ransomware battle are education, implementation, and remediation.
Improving network security by ‘deflecting’ cybercriminals
Even with the best perimeter defences in place, malicious actors can still gain access to a network and resources connected to it. But a new technique has made it significantly easier to spot these cyber-attackers.
Attivo Networks raises the stakes against 'Ransomware 2.0'
“Advanced human-controlled ransomware can evade endpoint security controls and after initial compromise, move laterally to cause maximum damage, do data exfiltration and encrypt data."
Report: Brute-force attacks feed on remote working vulnerabilities
A new report from ESET has detailed the extent to which attackers employ brute-force tactics to infiltrate remote desktop protocols.
54% rise in gaming-related cyber attacks recorded in April
Social isolation measures, widely implemented throughout the world during March and April, has been linked to both the increase in engagement for gaming and a corresponding boom in game-related cyber attacks.
Microsoft releases latest edition of Security Endpoints Threats report
he latest iteration of the report sheds more light on the difference in exposure and response to cyber threats between developed and developing countries in APAC.
Ransomware attacks swell, average ransom payments rise - report
Between 2018 and 2019, the value of demanded ransom payments rose 140%, peaking at an average of US$18,000, while a reported 57% of surveyed organisations settled and paid ransoms during the last 12 months, according to a report from Atlas VPN.
Digital heists: Attacks on financial institutions rise 238% in 3 months
The pandemic has created a perfect storm for financial cybercrime, with attackers taking advantage of every opportunity they get to target financial institutions.
One in three ransomware attacks target business users
Ransomware has become a big challenge for many organisations, despite the attack method not being the most advanced threat.
Shadow of ransomware looms over healthcare sector
“Hackers will continue to target vulnerable systems as long as there are profits to be made: from selling the stolen patient’s data to holding the healthcare systems hostage until the criminals’ demands are met.”
Consumer tolerance of cyber attacks wanes as users wise-up about security
Almost 90% of survey respondents said they consider the trustworthiness of a business prior to purchasing a product or service, and 59% of consumers would likely avoid doing business with an organisation that had experienced a cyberattack in the past year.
New report reveals key concerns of threat management pros in 2020
“Much of this year’s research indicates a continued demand for in-network detection that works reliably across existing and emerging attack surfaces and is effective against all attack vectors.”
Check Point discovers new double extortion ransomeware tactic
To prove the validity of the threat, threat actors leak a small portion of sensitive information to the dark web, dangling intimidation that more is to follow if ransom goes unpaid.
Data is more valuable to cyber attackers than cash - report
Data theft was the goal of more than half of all attacks in 2019, according to PT. This is a 20 percentage point increase compared to 2018 when data theft was the goal of only 30% of incidents.
2020 will be 'the year of mobile sneak attacks' - McAfee
Hidden apps are projected to be the cornerstone of the mobile sneak attack, with the McAfee report finding nearly 50% of all malicious activities in 2019 were from hidden apps.
Financial cybercrime happened 'almost continuously' in 2019
The CrowdStrike global threat report confirmed cases of data exfiltration have been rising, which can allow cyber attackers to leak and weaponise sensitive data gleaned from victims.
90% of cyber attackers using defence evasion tactics - report
A VMware Carbon Black report widespread usage of the tactic, which ensures attacks are not detected.
Malwarebytes enhances enterprise, channel cloud offerings
The company has launched an enhanced cloud platform and made its MSP partner programme generally available.