- Verify Your Valentine - This Valentine’s Day, before you go looking for love in all the wrong chat rooms, CISA reminds users to be wary of internet romance scams. At first, cyber criminals promise the reward of romance after adopting an alias to appear as a potential partner. Once your heart is hooked on hope, they turn the tables.… Continue Reading
- With one update, this malicious Android app hijacked millions of devices - All it takes is one tweak to change a legitimate app into a frustrating parasite on your handset. With a single update, a popular barcode scanner app on Google Play transformed into malware and was able to hijack up to 10 million devices. Lavabird Ltd.'s Barcode Scanner was an Android app that had been… Continue Reading
- FTC Reports Scammers Impersonating FTC - The Federal Trade Commission (FTC) has released information on scammers attempting to impersonate the FTC. The scammers operate an FTC-spoofed website that claims to provide instant cash payments and tries to trick consumers into disclosing their financial information. The real FTC does not require such information and scammers can use this information to steal consumers’… Continue Reading
- Cybersecurity: This ‘costly and destructive’ malware is the biggest threat to your network - Emotet remains a major threat to corporate computer networks entering 2021, warn researchers - and other threats including ransomware, trojans and cryptominers are lurking out there too. A spam campaign which targeted over 100,000 users a day over Christmas and New Year has seen Emotet secure its spot as the most prolific malware threat. Analysis… Continue Reading
- This new phishing attack uses an odd lure to deliver Windows trojan malware - QRat trojan malware provides hackers with complete control of infected machines and the ability to steal passwords and other sensitive data - but the phishing emails are unconventional. A new phishing campaign is attempting to lure victims into downloading malware which gives cyber criminals full control over infected Microsoft Windows machines. Quaverse Remote Access Trojan… Continue Reading
- Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways - The username and password (zyfwp/PrOw!aN_fXp) were visible in one of the Zyxel firmware binaries. More than 100,000 Zyxel firewalls, VPN gateways, and access point controllers contain a hardcoded admin-level backdoor account that can grant attackers root access to devices via either the SSH interface or the web administration panel. The backdoor account, discovered by a… Continue Reading
- Vaccination Scams - It hasn’t even been available for a minute and we’re already being warned about scams surrounding the COVID-19 vaccination. With healthcare being a huge target for cybercrime already, this isn’t surprising. Consumers should be aware of phone calls, text messages, social media links and posts, emails, and even in person tactics that will be used… Continue Reading
- Microsoft says it identified 40+ victims of the SolarWinds Hack - Microsoft says 80% of the victims it identified were located in the United States. Microsoft said it identified more than 40 of its customers that installed trojanized versions of the SolarWinds Orion platform and where hackers escalated intrusions with additional, second-stage payloads. The OS maker said it was able to discover these intrusions using… Continue Reading
- Three million users installed 28 malicious Chrome or Edge extensions - Extensions could redirect users to ads, phishing sites, collect user data, or download malware on infected systems. More than three million internet users are believed to have installed 15 Chrome, and 13 Edge extensions that contain malicious code, security firm Avast said today. The 28 extensions contained code that could perform several malicious operations. Avast… Continue Reading
- Sextortionist Campaign Targets iOS, Android Users with New Spyware - Goontact lures users of illicit sites through Telegram and other secure messaging apps and steals their information for future fraudulent use. New spyware is targeting iOS and Android frequenters of adult mobile sites by posing as a secure messaging application in yet another twist on sextortionist scams. The spyware, dubbed Goontact, targets users of escort-service… Continue Reading
What are cybersecurity threats?
A cybersecurity threat is any malicious attack by an individual or organization to gain access to another individual’s or organization’s network to corrupt data or steal confidential information. Sometimes, the attacks destroy computer systems.
No company is immune from cyber attacks and the resulting data breaches. As cyber threats become increasingly sophisticated, businesses must ensure they implement the security necessary to safeguard their data and their networks.
However, before they can do that, organizations need to understand the types of threats they’ll be facing almost daily, including:
- Trojan: A type of malicious software (malware) or code that acts as a legitimate application or file to trick a user into loading and executing the malware on his device. A Trojan’s goal is to damage or steal an organization’s data or otherwise inflict some harmful action on its network.
- Virus: A malicious program aimed at infecting a company’s systems, destroying data and bringing its network to a standstill. A virus attaches itself to a program, file, or document and lies dormant until some event triggers the device to execute its code.
- Phishing attacks: A type of social engineering that attempts to trick users into bypassing normal cybersecurity practices and giving up sensitive data, such as user names and passwords, bank account information, Social Security numbers, and credit card data. Typically, hackers send out phishing scam emails that appear to come from trusted senders, such as PayPal, eBay, financial institutions, as well as friends and co-workers. The cybercriminals try to get users to click on links in the emails that will redirect them to fraudulent websites that ask for personal information or install malware on their devices. Opening attachments sent with phishing emails can also install malware on users’ devices, or allow the hackers to control their devices remotely.
- Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. … It has the ability to lock a computer screen or encrypt important, predetermined files with a password.
- Distributed denial of service (DDoS): A DDoS attack aims to take down a company’s website by overwhelming its servers with requests. In this attack, requests come from hundreds or thousands of IP addresses that have probably also been compromised and tricked into continuously requesting a company’s website. A DDoS attack overloads an organization’s servers, slows them down significantly or temporarily takes them offline. This prevents customers from accessing the website and completing orders.