You are here

Cybersecurity

Security Awareness – Human Factors of Cyber Attacks

Exploiting technical vulnerabilities is only part of the threat-scape – typically accomplished by the more sophisticated (or well-resourced) actors or groups. However, by volume, threat actors spend much more time and effort hitting us in our inboxes, via infected websites, and exploiting other human vectors, such as phones and MFA. Proofpoint’s 2023 Human Factor Report corroborates the countless incidents we see every day, that social engineering remains the most common technique with the vast majority using some element of psychological manipulation.

Cyber Resilience - World Economic Forum’s Cybercrime Atlas Initiative Takes Information Sharing Global

Harvard Business Review has written an article discussing the World Economic Forum’s Cybercrime Atlas project and how it supports global information sharing to help reduce cybercrime. This initiative aims to provide a platform that academics, cybersecurity companies, national and international law enforcement agencies, and global businesses can access to share threat information regarding the global cybercrime ecosystem.

Vendor Risk Management – Vendor and Contractor Accounts Becoming Increasingly Popular Method to Infiltrate Networks

Talos published research into threat actors increasing use of third-party compromised accounts to access organizations’ networks. Vendor and contractor accounts (VCAs), as Talos calls them, are attractive to adversaries due to elevated privileges and unusual activity compared to an organizations’ regular workforce, making it easier to mask malicious behavior.

Binding Operational Directive 23-02: Mitigating the Risk from Internet-Exposed Management Interfaces

Today, the Cybersecurity and Infrastructure Security Agency (CISA) announced a new Binding Operational Directive (BOD) 23-02: Mitigating the Risk from Internet-Exposed Management Interfaces. The BOD instructs federal agencies to reduce the attack surface created by insecure or misconfigured remote management interfaces exposed to the internet.

Pages

Subscribe to Cybersecurity