Small- or medium-sized business (SMB) owners may think they’re unimportant enough to be targeted by hackers. But the truth is that SMBs are prime targets for hackers since they see these organizations — which have less security and fewer resources compared to enterprises — as easy marks. Fortunately, knowing who these attackers are and what […]
More and more cybercriminals are launching watering hole attacks to gain access to company networks. But what exactly is a watering hole attack, and how can you protect yourself from it? Read on to learn how. How watering hole attacks work The term “watering hole” colloquially refers to a social gathering place where a particular […]
Cybercriminals are no longer interested in hacking your software applications to infiltrate your systems and steal sensitive information for their own gain. Instead, they are now exploiting what they believe is the most vulnerable aspect of your organization: your employees.
With cybercriminals continuously developing new ways to infiltrate networks and steal user data, it is more crucial than ever to stay one step ahead of these perpetrators. Protect yourself from one of the most common methods that cybercriminals use to inject malware into computers: watering hole attacks. The term “watering hole” colloquially refers to a […]
Malicious hackers are motivated by different things. Some do it for fun, some want money, and others just want to end your business. Getting to know how they behave and what drives them informs how you must defend your organization against them. Script kiddies In terms of skill, script kiddies (or skids, for short) are […]
As annoying as spam email is, it’s usually pretty harmless. But hackers have been using a method called distributed spam distraction (DSD) where spam email is used to carry out illegal activities. Learn more about DSD and how you can safeguard your systems against it. What is DSD? DSD is a type of attack wherein […]
Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals. Learn more about one way these criminals steal data — through […]
Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It’s a three-step attack that’s easy to avoid if you know how it works. Step 1 – Invitation to collaborate email The first thing […]
After analyzing over 53,000 cybersecurity incidents, Verizon’s 2018 Data Breach Investigations Report revealed that 58% of all malware victims were small businesses. Although there was a time when hackers preferred one-off attacks against big-fish targets, new types of malware have made it easy to automate small-scale attacks against thousands of victims.
Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. What are watering hole attacks? Much like phishing, […]