The findings and trends in this report are derived from data points and insights collected from a wide variety of incident response (IR) engagements and proactive services activities over the past 12 months. Report2020CrowdStrikeServicesCyberFrontLines
Read more
Come gestire il data breach: le regole nelle Linee guida EDPB
L’EDPB con le nuove linee guida sulla gestione del data breach offre un utile vademecum per far fronte alle violazioni dei dati: il documento include casi concreti di attacchi ransomware, per esempio verso ospedali o trasporti pubblici, e spiega in che modo comportarsi. https://www.agendadigitale.eu/sicurezza/privacy/privacy-come-gestire-il-data-breach-le-regole-nelle-linee-guida-edpb/ EDPB guidelines on examples regarding data Breach
Read more
2020 Year End Report Data Breach QuickView
RiskBased Security In a year characterized by audacious breaches and an unprecedented amount of data exposed, one threat actor in particular has left an indelible mark on 2020. In the last quarter, the person (or group) known as “ShinyHunters” offered up a third wave of data leaks, completing a trifecta of data dumps that ultimately…
Read more
Hacker lasciano in piena vista le credenziali di rubate attraverso una campagna di phishing.
Dal noto blog di Checkpoint Cyber-crime is a complex landscape, but when it comes to actually launching cyber-attacks, there are three main techniques that criminals have relied on for decades to help them get around organizations’ defenses and into their networks: phishing, credentials theft and business email compromise. According to Verizon’s Data Breach Investigation Report, these…
Read more