vulnerabilities

Cyber Signals: December 2022

Microsoft has released its third edition of Cyber Signals, a regular cyberthreat intelligence brief spotlighting security trends and insights gathered from Microsoft’s 43 trillion daily security signals and 8,500 security experts. This edition highlights new insights on the wider risks that converging IT, Internet-of-Things (IoT), and Operational Technology (OT) systems pose to critical infrastructure, and […]

Cyber Signals: December 2022 Read More »

Enemy at the Gates

Financial services is among the industries that have been the heaviest hit by cybercrime — from the heyday of the Zeus and other banking trojans to Distributed Denial-of-Service (DDoS) attacks, modern phishing attacks, and ransomware. FinServ is a vital sector that plays a major role not only in the lives of people, but also in

Enemy at the Gates Read More »

The 2022 Singapore User Risk Report

The 2022 Singapore User Risk Report complements research from the 2022 Human Factor from Proofpoint. Since its inception, the Human Factor has explored a simple premise: that people—not technology—are the most critical variable in today’s cyber threats. Since then, this once-contrarian notion has become a widely acknowledged reality. Cyber attackers target people. They exploit people.

The 2022 Singapore User Risk Report Read More »

The Threat Report: Fall 2022

In the third quarter of 2022, Trellix delivered a new, powerful resource to support the future of extended detection and response (XDR) and cybersecurity. The Trellix Advanced Research Center, comprised of hundreds of elite security analysts and researchers was established to help customers detect, respond, and remediate the latest cybersecurity threats. Threat actors also made

The Threat Report: Fall 2022 Read More »

State of XIoT Security

Team82’s analysis of vulnerabilities impacting cyber-physical systems across the Extended Internet of Things—1H 2022 After more than 20 years of connecting things to the internet, we’ve reached a critical mass where the food we eat, water we drink, elevators we ride, and the oil and gas that warms our homes rely on computer code. Today’s

State of XIoT Security Read More »