Exploiting the BlastRADIUS vulnerability leverages a man-in-the-middle attack on the RADIUS authentication process.
Exploiting the BlastRADIUS vulnerability leverages a man-in-the-middle attack on the RADIUS authentication process.
Nearly 10 billion passwords have been leaked on a popular hacking forum, according to Cybernews.
Operational technology users face challenges including communication between process engineering and cyber security teams, a growth in malware and ransomware, and insiders making basic technology mistakes.
Travelling for work can open employees up to a new host of security threats, including insecure Wi-Fi networks, infected public charging ports and Bluetooth attacks.
Rates have declined by 15% since the market peak in 2022, according to Howden Insurance Brokers.
Analysts found that 52% of open-source projects are written in memory-unsafe languages like C and C++.
Expert insight from our head of security testing As we get deeper into 2024, we felt it was time to sit down with our head of security testing, James Pickard, to talk about what trends in cyber security he’s seeing. He pointed to the rise of AI, and how this is changing cyber security, particularly in terms of social engineering attacks. We also covered other areas, including ransomware trends and how organisations can protect themselves. About James Pickard James is an expert penetration tester – and our head of security testing – with more than a decade in the field.
The post Security Trends for 2024 and Beyond appeared first on IT Governance UK Blog.
Expert insight from our cyber incident responder When talking to clients or taking questions at the end of webinars, many ask us about ransomware. In fact, ransomware is often the first thing people ask about! Organisations seem really worried about it – and understandably so. Ransomware features a lot in the news. A particularly noteworthy attack was MOVEit, which was also a zero-day exploit, but we see plenty of ‘run-of-the-mill’ attacks too. There are even daily ransomware victim feeds! Admittedly, threat actors can and do claim attacks that didn’t happen or are exaggerated. Nonetheless, the risk of a cyber incident
The post Worrying Ransomware Trends, and What to Do About Them appeared first on IT Governance UK Blog.
The authors of the report also say that attendees will “almost certainly” be targeted with Olympics-related phishing schemes.
Expert insight from our cyber incident responder Cyber attacks and data breaches are a matter of when, not if. No single measure is 100% foolproof. A determined attacker will always be able to find their way around your defences, given enough time and resources. Furthermore, as Vanessa Horton, our cyber incident responder, pointed out in an interview about anti-forensics: The cyber world is changing all the time, which means we’re playing a bit of a cat-and-mouse game. Basically, as one side improves, so does the other. In this interview, I pick her brain on cyber incident response more generally, gaining
The post A Practical Guide to Cyber Incident Response appeared first on IT Governance UK Blog.