Despite often being considered a ‘dinosaur’ technology, the Coronavirus pandemic gave Virtual private network software or (VPNs) a new lease of life as IT teams scrambled to protect their newly remote employees.
Cybercriminals continue to find ways around web application firewalls, but there are better options for preventing attacks such as data exfiltration prevention.
With a significant increase in value of cryptocurrencies over the past year, 2021 is on pace to exceed 2018 as the “year of cryptojacking”. Cryptojacking experts are seeing steady upward momentum every year, along with new threats and risks.
While some organizations are waking up to the fact the ransomware attacks are in fact data breaches, unless perhaps data exfiltration technology can prove otherwise, many are still opting to sweep the attack under the carpet.
Looking back at the cyberattacks of 2020, selecting what we see as the top 10 was no easy task. Attacks were frequent, particularly when it came to ransomware, which rose seven-fold last year. We discuss how data exfiltration prevention could have stopped the top 10 cyberattacks of 2020.
BlackFog partners with Evolve cybersecurity insurance specialist in the United States for cyberthreat protection and to mitigate the risks associated with ransomware.
In addition to the dramatic rise in ransomware during 2020, many organizations face an even more imminent danger, the insider threat. Leading analyst firm Forrester expects insiders to be responsible for a third of breaches in 2021, up 8% from 2020, mostly due to the increase in remote working.
If 2020 has taught IT security leaders anything, it’s that remote workers are more vulnerable to cyberattacks and ransomware, and the tools that they thought would protect them outside the walls of the corporate environment simply didn’t in many cases.
The threat of data loss, data breaches and ransomware is on the minds of everyone. We discuss the crucial part that data exfiltration plays in defending an organization from these modern threats.
Homographs are the latest in a long line of new attack vectors now being used by cybercriminals to trick users into disclosing personal information such as passwords or other sensitive data.