After a data leak, hackers can acquire log-in data on the dark web and gain access to the corporate network. With dark web monitoring as part of the security strategy, companies can react quickly and minimize potential damage. Source: it-business.de #cybercrime...
The IT security authority of the United Kingdom launches a digital security scanner service. The tool scans all the country’s IT systems for security issues. Source: heise.de #UK #ITSecurity #Hacking #newnnormal #newnormalint...
After the Covid-19 pandemic, the demand for cloud-collaboration solutions such as Microsoft Teams grew rapidly. Simultaneously, cyberattacks seeking to exploit the weaknesses of these networks grew. The risks of hacker attacks, ransomware, and phishing continue to...
A harmless mail from a company email address, maybe asking to register for a new mailing list. In reality, cybercriminals are the senders. This way they are trying to get acces to the company network. In broad daylight. These attacks are called #phishing and even...
The cybercrime avalanche is rolling rapidly. Ransomware as a service is becoming more attractive. The number of criminal acts online is increasing. This is documented in the Sophos Threat Report 2023 and shows how strongly cybercrime is currently being commercialized....