Cybercrime

Cyber Security in Healthcare Roundtable Summit

A 1 Day conference for healthcare leaders where you will discover the latest strategies and technologies to create a cyber security roadmap for your organisation. Join leading practitioners in hospitals and medical organisations, government leaders and cyber gurus, and experts at the forefront of risk management in healthcare to help you: Understand the escalating cyber […]

Cyber Security in Healthcare Roundtable Summit Read More »

Security spotlight: The cost of human error and the advantages of automation

Why organisations are reconsidering manual approaches to managing security, and how intelligent automation helps to prevent potential threats from slipping through costly cracks. Cybercrime is on the rise Cybercrime is rife right now. As companies embrace digital transformation and adapt to hybrid models of work, cyber attackers are on the move, too. One can almost

Security spotlight: The cost of human error and the advantages of automation Read More »

Compliance with the NSW Cyber Security Policy

Cyber security is increasingly a focus of governments around Australia. The Australian Cyber Security Centre (ACSC) is the Australian Government’s lead agency for cyber security and is part of the Australian Signals Directorate, a statutory authority within the Australian Government’s Defence portfolio. The ACSC has advised that government agencies at all levels, as well as

Compliance with the NSW Cyber Security Policy Read More »

2021 Bitdefender Global Report: Cybersecurity and Online Behaviours

Executive Summary PLATFORMS, APPLICATIONS,SERVICES Internet users have on average8 online platform accounts. Of those analyzed, the top used are Facebook, WhatsApp, Gmail and YouTube. There are several usage differences among males and females and across age groups. Facebook and WhatsApp are used most by those 25+, Gmail is more popular after 35, while YouTube and

2021 Bitdefender Global Report: Cybersecurity and Online Behaviours Read More »

FIN8 Threat Actor Goes Agile with New Sardonic Backdoor

Since January 2016, FIN8 has been steadily building a reputation among financially motivated advanced threat actors. Bitdefender researchers are constantly monitoring this group’s activity, and previous research released in early 2021 documented the use of a new, improved version of the BADHATCH backdoor. This whitepaper focuses on the analysis of a new backdoor component discovered

FIN8 Threat Actor Goes Agile with New Sardonic Backdoor Read More »

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation

GOALS The goals of this paper are to demonstrate how dangerous ransomware has become, describe the latest techniques used by ransomware gangs, and suggest what your organization can do to reduce exposure to, and damage from, ransomware attacks. Three ransomware attack vectors are addressed in this order: remote access, email, and supply chain. RANSOMWARE —

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation Read More »

Global Incident Response Threat Report

Manipulating reality: The rise of business communication compromise, time-stamp manipulation, and cloud-jacking empowers adversaries to execute integrity attacks Key findings Attacks are becoming more destructive and targeted through advanced techniques. Respondents indicate that targeted victims now experience integrity and destructive attacks more than 50 percent of the time. Cybercriminals are achieving this through emerging techniques,

Global Incident Response Threat Report Read More »