PIPEDREAM is the seventh known ICS-specific malware. The CHERNOVITE Activity Group (AG) developed PIPEDREAM. PIPEDREAM is a modular ICS attack framework that an adversary could leverage to cause disruption, degradation, and possibly even destruction depending on targets and the environment.
Dragos assesses with...
In our latest report, we detail seven primary cyber threats that organizations across the financial services sector will face in 2022. Some of them, such as ransomware, are not new but nevertheless remain a serious threat. Others, such as decentralized finance (DeFi) and cryptocurrencies, are newer, so to speak, and...
A data breach involving email marketing firm Mailchimp has affected customers of cryptocurrency hardware wallet provider Trezor, which launched an investigation after its customers received phishing emails containing their Trezor email addresses. Mailchimp says it learned of the breach on March 26.
Researchers from Malwarebytes have found that cyberespionage actor UAC-0056, also known as SaintBear, UNC2589 and TA471, is now using a macro-embedded Excel document to target several entities in Ukraine, including ICTV, a private TV channel.
Mimecast’s 2022 State of Email Security findings stress the importance of a cyber resilience strategy, layered defences, cyber awareness training, and the use of AI/ML for protection in the new digital landscape. With the number of publicly reported data breaches soaring past the prior year’s total, 2021 appears...
Ransomware is no longer just a single act of encryption. It has quickly grown into a multi-level attack. Even if you comply with ransom demands, you can suffer subsequent extortion, from threats to publishing sensitive data to DDoS attacks against your services.
Preventative cybersecurity is the best way to avoid...
MSPs are burdened by complex security tools that require considerable time and resources to manage, squeezing MSP margins and increasing breach potential. With cybersecurity threats rising to unprecedented levels, MSPs cannot afford to waste precious time on complicated tools while their clients are being...
The scary fact is that the majority of data breaches are caused by human error. With so many technical controls in place hackers are still getting through to your end users. How are they so easily manipulated into giving the cybercriminals what they want? Well, hackers are crafty. And the best way to beat them is to...
Protecting Microsoft 365 requires additional email security. A solution that works with EOP gives you the built-in
protection of EOP, along with an added layer of security to make up for its shortcomings.
Vade for M365 blocks advanced attacks from the first email thanks to machine learning algorithms and...
Thanks to its native API integration, Vade augments Microsoft 365’s reputation and signature-based defenses with AI-based predictive email defense—without requiring your users to change their behavior.
Download the datasheet to learn how Vade for M365 is purpose-built for MSPs:
Multi-tenant incident...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.