The following letter was sent by (ISC)² CEO Clar Rosso to all (ISC)² members and associates, sharing insights into several developments at (ISC)² focused on addressing the workforce gap and creating cybersecurity career opportunities for more people worldwide. Dear Members, … Read More
Monthly Archives: August 2022
Become an (ISC)² Candidate – No Exam, Experience or Fees Required
Today, (ISC)² launched a new initiative so that anyone can join our association as an (ISC)² Candidate. When you become an (ISC)² Candidate, you’ll gain access to many of the benefits and resources that (ISC)² certified members and Associates of … Read More
LockBit Ransomware Group Steps Up Their Game with Triple Extortion as the Next Evolution
After suffering a taste of their own medicine as part of a response effort from victim organization Entrust, LockBit appears to have bounced back even stronger than before.
Phishing and Malicious Emails Are Still the Primary Initial Attack Vector
As cybercriminals continue to evolve their techniques, they continue to rely on phishing as the most successful tried and true method of initial attack, according to new data from Acronis.
Phishing Attacks Leveraging Legitimate SaaS Platforms Soars 1100%
As threat actors look for ways to evade detection by security solutions, the use of cloud applications has seen a material jump in the last 12 months, according to new data.
So, Your MFA is Phishable, What To Do Next
We’ve written a lot about multi-factor authentication (MFA) not being the Holy Grail to prevent phishing attacks, including here:
[KREBS ON SECURITY] How 1-Time Passcodes Became a Corporate Liability
[The following article is at it appears at Krebs on Security here.] Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world’s largest technology companies and customer support … Read More
CyberheistNews Vol 12 #35 [Heads Up] Check This Highly Sophisticated LinkedIn Job Offer Scam
The Extent of Social Engineering
Researchers at NordVPN have published the results of a survey that found that 84% of Americans have experienced some form of social engineering, although only 54% have heard of the term “social engineering.” 85% percent of the respondents said they … Read More
#ISC2Congress: Empower Your Career
The Career Center is back at (ISC)² Security Congress, and this year it’s hybrid! Open October 10-12, the Career Center will offer on-site and virtual events on the first two days, with the final day reserved exclusively for virtual sessions. … Read More
(ISC)² Certified in Cybersecurity Entry-Level Certification Officially Launches!
We are excited to announce that more than 1,500 individuals, who passed the exam during our pilot program, are now on their path to full certification with the (ISC)² Certified in Cybersecurity℠, – our entry-level certification. These newly awarded certified … Read More
Researchers warn of darkverse emerging from the metaverse
ARN just reported: “The metaverse is seen by many companies as a great business opportunity and for new ways of working. Security provider Trend Micro, however, warns in a recent research report that cyber criminals could misuse the technology for their own purposes.
Latest Cyberthreats and Advisories – August 26, 2022
IT fiascos in healthcare, a dramatic rise in cyberattacks and an FBI warning highlight this week’s cybersecurity news. Here are the latest cybersecurity threats and advisories for the week of August 26, 2022. Threat Advisories and Alerts Credential Stuffing Attacks … Read More
Phishing Remains the Initial Infection Vector in 78% of Attacks Against OT-Heavy Industries
Companies heavily reliant on operational technology (OT) to function are just as much a target as businesses relying in traditional IT and are facing some of the same challenges to stop attacks.
BlackByte Ransomware Gang Comes Back to Life with a New Extortion Strategy
First debuted in July 2021, this ransomware gang that engages in their own attacks and offers a RWaaS model, has come back into the limelight offering victims several extortion payment options.
The Crypto Collapse Will Only Add Fuel to the Cyberattack Fire
Despite the crypto market’s loss of over $1 trillion in value since the beginning of the year, the value of the digital currency isn’t what makes it a popular choice for cybercriminals.
State-Based Cyberattacks to be Excluded from Lloyd’s of London Cyber Insurance Policies
As cyber insurers evolve their understanding of the cyber attack landscape, who’s responsible, and what’s at stake, a logical next step is taken by Lloyd’s to better isolate what is covered and what isn’t.
[HEADS UP] Highly Sophisticated Job Offer Scam
If you’ve been approached by recruiters on LinkedIn for a potential job opportunity, you may want to pay attention to this recent scam.
Dueling Clauses, or, not all Fraud is the Same
There are, famously, three things you can do with risk: accept it, mitigate it, or transfer it. And you transfer risk by buying insurance against it.
Teach Two Things to Decrease Phishing Attack Success
We know everyone is busy. Everyone already has too much on their plate and is trying to learn as much as they can every day.