HomeCII/OTWeek in review: Fileless attacks surge by 1,400%, customers abandon brands affected...

Week in review: Fileless attacks surge by 1,400%, customers abandon brands affected by ransomware

Published on

spot_img

Last week brought a variety of intriguing news, articles, interviews, and videos in the world of technology and cybersecurity. Here is a recap of some of the most noteworthy developments:

In an interview with Help Net Security, Mike Fey, CEO of Island, shed light on the distinctions between consumer browsers and the Island Enterprise Browser. Fey emphasized how the latter prioritizes the protection of organizations’ data and utilizes contextual information to create a secure browsing experience for users.

Nadir Izrael, co-founder, and CTO of Armis, delved into the global efforts and discrepancies surrounding responsible AI in an interview with Help Net Security. Izrael stressed the need for measures that ensure responsible AI innovation in the United States.

The month of June witnessed numerous reports regarding issues caused by Microsoft’s June releases and problems within their software and services. As a result, there has been a significant level of instability, as reported in the Help Net Security article “July 2023 Patch Tuesday forecast: A month of instability and uncertainty.”

Help Net Security featured an article on cultivating a culture of continuous cybersecurity improvement. The piece emphasized the distinction between regulatory compliance and cybersecurity improvement, asserting that the former merely establishes a baseline defense and does not guarantee protection against threats.

Charl van der Walt, Head of Security Research at Orange Cyberdefense, tackled the rising threat of cyber extortion attacks in a Help Net Security video. Van der Walt discussed the expansion of these attacks to new regions and emphasized the need for proactive measures to combat them.

A survey conducted by Object First revealed that 40% of consumers are skeptical about organizations’ ability to protect their data. In the event of a ransomware attack, 75% of consumers stated they would switch to alternative brands, highlighting the importance of robust data protection measures.

In another Help Net Security video, Steve Gwizdala, VP of Healthcare at ForgeRock, explored how ransomware impacts the healthcare industry. Gwizdala stressed the necessity for enhanced cybersecurity measures and vigilance to protect consumers’ online information in healthcare organizations and businesses across the supply chain.

Aqua Security shared aggregated data from honeypots, revealing a 1,400% increase in fileless attacks over a six-month period. These attacks primarily focused on defense evasion, posing significant challenges for cybersecurity professionals.

Despite impressive surface-level confidence in hybrid cloud security (94% of global respondents), Gigamon found that almost one-third of security breaches go unnoticed by IT and security professionals. This challenges the notion that organizations have complete visibility and insights into their IT infrastructure.

Computer scientists at the University of Waterloo discovered a method to bypass voice authentication security systems with a success rate of up to 99% after only six attempts. This breakthrough raises concerns about the effectiveness of voice authentication and the need for stronger security measures.

Small organizations face the same security threats as larger entities but often lack the necessary resources to address them effectively, as stated by Netwrix. This highlights the importance of implementing cost-effective cybersecurity solutions for small businesses.

OpenText’s research revealed that 86% of customers outsourced their security needs to consolidate security tools due to resource and cost constraints. Short-staffed teams are finding ways to do more with less by streamlining their security strategies.

IT leaders expressed concerns regarding improving overall IT performance, data security, process risk and compliance, and the need for greater agility, according to Rocket Software. They recognize hybrid cloud solutions as the future of IT and aim to address these challenges through appropriate measures.

A study commissioned by Productiv found that 53% of SaaS licenses remain unused within enterprises. To avoid spending and governance challenges, enterprise leaders in procurement, IT, and finance must rationalize their SaaS portfolios.

Finally, Help Net Security selected various infosec products of the month, including releases from notable companies such as 1Password, Bitdefender, ESET, Island, NetApp, Okta, and many more. These products offer innovative solutions to address the evolving cybersecurity landscape.

In conclusion, last week’s news covered a wide range of cybersecurity topics, including browser security, responsible AI, ransomware attacks, fileless attacks, and the challenges faced by small organizations. The articles, interviews, and videos provided valuable insights into current cybersecurity issues and innovative solutions.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...