Blog - TSP

Cybercriminals are using catfishing tactics to target victims and spread malware

A report from HP Wolf Security reveals that cybercriminals are employing overdue invoice scams, open redirects, and Living-off-the-Land (LotL) tactics to evade cybersecurity measures. The report examines actual attacks observed in Q1, highlighting significant campaigns such as cat-phishing, Windows Background Intelligent Transfer Service (BITS) exploitation, and HTML smuggling. Attackers utilized open redirects in cat-phishing schemes, […]

Damage occurs in nearly 90% of organizations following a security incident

Security incident response was recently examined by Cado Security, revealing that almost 90% of organizations experience damage before effectively containing and investigating incidents. Challenges and complexities result in 23% of cloud alerts going unresolved by organizations. The study indicates that 82% of organizations find it necessary to utilize multiple platforms and tools for cloud investigations. […]

Report: Majority of water systems fail to meet EPA compliance standards

The Environmental Protection Agency (EPA) has released an enforcement alert, outlining the steps that vulnerable community drinking water systems must take in order to comply with cybersecurity standards set forth by the Safe Drinking Water Act. This alert is part of an ongoing effort to secure the United States’ critical infrastructure. Notably, an investigation by […]

Malicious Emails Increase by 341% Over Last Six Months

A recent report from SlashNext  shows a significant 341% increase in malicious emails over the past six months. This surge includes a rise in BEC, phishing, and other message-based attacks facilitated by generative AI. Key findings from the report are: Since November 2022, malicious emails have spiked by 4,151% due to the introduction of ChatGPT. […]

BEC attacks targeted 70% of organizations in the past year

An analysis by Arctic Wolf indicates that business email compromise (BEC) incidents are widespread, with 70% of organizations facing attempted attacks in the past year. Of these, 29% fell prey to one or more successful BEC attacks. The assessment also delves into ransomware. It states that 45% of the respondents faced a ransomware occurrence in […]

Top motivator for cloud-based backup is data protection

Cloud adoption and security were examined in a recent report from Veeam Software. According to the report, organizations are increasingly considering cloud-based backup due to the desire to merge cyber technologies with data protection and backup, as well as the enhanced and consistent protection of cloud-hosted workloads. Many organizations start by integrating cloud storage into […]

Report: Generative AI bots can be easily influenced by users

A new report by Immersive Labs has found that generative AI bots are vulnerable to manipulation by users of all skill levels, not just cyber experts. The report highlights the main security concern of generative AI’s susceptibility to prompt injection attacks, where users input specific commands to trick chatbots into revealing sensitive information, potentially leading […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC