Blog - TSP

Bots accounted for 36% of global internet traffic

A recent report by Fastly analyzed cybersecurity threats and revealed that 91% of cyberattacks – an increase from 69% in 2023 – targeted multiple customers through mass scanning techniques to exploit software vulnerabilities. The report also found that 91% of attacks from NLX sources targeted multiple customers, with 19% targeting over 100 different customers. This […]

Top 5 Security Updates – June 2024

Security’s Top 5 from Security magazine highlights the top stories and latest developments from the security industry during the month of June. Security Leaders Respond to Ticketmaster Breach The ShinyHunters threat operation has allegedly hacked Ticketmaster, prompting security leaders to share their insights. Four Ways Cybercriminals Can Hack Passwords Discover four common techniques used by […]

Top 5 ransomware groups and the ransomware they deliver in 2024

Cofense Intelligence has announced research revealing the most prominent five ransomware groups. The ransomware groups are:  LockBit 3.0 BlackCat BianLian Akira BlackSuit Among RaaS groups, LockBit 3.0 is the most active. This organization predominantly targets the healthcare and public health sector, utilizing a variety or approaches such as IABs, phishing campaigns and direct attacks. A […]

8 Security Flaws Discovered in macOS Operating System for Microsoft Applications

8 vulnerabilities have been discovered in macOS operating system Microsoft apps by researchers from Cisco Talos. These vulnerabilities allow a malicious actor to bypass the permission model of the OS using existing permissions without further user verification. Exploiting these vulnerabilities could give an attacker privileges within the targeted application, such as sending emails, recording video […]

Cyber criminals focus their attacks on the manufacturing sector

Critical Start has recently published its biannual Cyber Threat Intelligence Report, highlighting the top threat trends witnessed in the first half of 2024. This encompasses emerging cybersecurity threats affecting industries like manufacturing, technology, healthcare, engineering and construction, and professional services. Noteworthy discoveries from the report include: Manufacturing emerges as the primary target industry for malicious […]

National Security Experts Address Public Data Breach

National Public Data, a background checking organization, experienced a breach potentially affecting 2.9 billion individuals. The breach exposed personally identifiable information (PII) such as names, phone numbers, mailing addresses, email addresses, and Social Security numbers.  “Organizations rely on the exchange of data for their vitality,” says Clyde Williamson, Product Management, Innovations at Protegrity. “Consumers share […]

Recent Study Reveals: Cybercriminals are Mimicking Tech Corporations

New research from Cado Security reveals that malicious actors are imitating tech companies in an effort to compromise corporate systems. Researchers discovered a typosquatting threat, in which malicious actors register domains that closely mimic an already existing domain. This is often done by replacing symbols with other, similar looking ones, such as swapping the letter […]

Microsoft Entra ID vulnerability allows for authentication bypass

Recent studies have revealed that Microsoft Entra ID (formerly Azure AD), a cloud-based identity and access management solution, can be exploited to bypass security protocols. Cybercriminals have found ways to manipulate the credential validation process, turning the pass-through authentication (PTA) agent into a tool that enables unauthorized access as any AD user. This opens up […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC