Cybercrime

Cyber Protection Operation Centers Report: Ransomware dominates threat landscape

Introduction and summary Acronis was the first company to implement complete integrated cyber protection to protect all data, applications and systems. Cyber protection requires the researching and monitoring of threats, as well as abiding by the five vectors of safety, accessibility, privacy, authenticity and security, or SAPAS. As part of the strategy, we’ve established four

Cyber Protection Operation Centers Report: Ransomware dominates threat landscape Read More »

Cyber Signals, August 2022

Introduction Cybercriminals emboldened by underground ransomware economy While ransomware continues to be a headline-grabbing topic, there’s ultimately a relatively small, connected ecosystem of players driving this sector of the cybercrime economy. The specialization and consolidation of the cybercrime economy has fueled ransomware as a service (RaaS) to become a dominant business model, enabling a wider

Cyber Signals, August 2022 Read More »

The Threat Report: Summer 2022

The first quarter of 2022 in cybersecurity was more about evolution than revolution. The techniques and prevalence of ransomware attacks advanced while Russian cyberattacks continued a slow-building evolution fed by the continuing conflict in Ukraine. Our latest Trellix Threat Report includes our findings from Q1 2022 and other vital research including the evolution of Russian

The Threat Report: Summer 2022 Read More »

True Cost of Fraud APAC Study

KEY FINDINGS The cost of fraud for surveyed industries in APAC has risen sharply. On average, a fraudulent transaction costs nearly four times the lost transaction value on average now, compared to between 3.46 to 3.57 times from 3 years ago. While retail and ecommerce industries are being hit with fraud, financial institutions are getting

True Cost of Fraud APAC Study Read More »

2022 Social Engineering Report

Social engineering is the preeminent component of the overwhelming majority of cyberattacks today. Whether the goal of a threat actor is to directly perpetrate fraud, harvest credentials, or install malware, at some point a human being must be coerced into taking an action on the actors’ behalf. This fact is the basis for Proofpoint’s People-Centric

2022 Social Engineering Report Read More »