AI plays a role in 40% of business email compromise (BEC) emails

62% of phishing emails successfully bypass DMARC verification checks

A recent report from Darktrace analyzed a staggering 17.8 million phishing emails. Shockingly, it revealed that 62% of these emails successfully passed domain-based message authentication, reporting, and conformance (DMARC) verification checks. Even more concerning is that over a third of these fraudulent emails managed to dodge detection by major email providers, with 56% outsmarting existing […]

Top concern for 86% of cyber professionals is unknown cyber risks

A report from Critical Start reveals that 86% of cyber professionals consider unknown cyber risks to be a major concern, a 17% increase from the previous year, emphasizing the need for effective threat detection and response. Key findings from the report include:  66% of organizations have limited insight into the company’s cyber risk posture.  65% […]

Implementing Application Security Testing through the Dora Framework

The Digital Operational Resilience Act (DORA) is a European cybersecurity framework that was enacted in December 2022 and will be enforced starting in 2025. While created specifically to ensure the resilience of the European Union’s financial systems and institutions in the face of cyberattacks and other incidents involving ICT (information and communication technology), DORA applies […]

A Supply Chain Breach Affects 99% of Global 2000 Organizations

A new study conducted by SecurityScorecard has found that nearly all Global 2000 companies (99%) have been impacted by a supply chain breach. The study suggests that the interconnected nature of modern business could be a contributing factor to this, as a vulnerability in one part of the supply chain could have widespread effects, potentially […]

Security vulnerabilities found in a widely-used web analytics platform

Recent findings by Salt Security have highlighted a security vulnerability in Hotjar, a popular web analytics provider. Researchers discovered a cross-site scripting (XSS) flaw, particularly when combined with OAuth technology. OAuth is widely used in various web services, particularly for social logins. Malicious actors can exploit this vulnerability by sending a legitimate-looking link to the […]

Response of Security Leaders to the HealthEquity Data Breach

HealthEquity suffered a data breach affecting approximately 4.3 million individuals. As reported in the data breach notice submitted to the Maine Attorney General’s office, the breach took place on March 9, 2024, and was identified on June 26, 2024. Insights from Security Experts Erich Kron, Security Awareness Advocate at KnowBe4:  “The theft of Personal Health […]

Response from Security Leaders to Advanced SMS Theft Campaign

Recent research conducted by Zimperium has uncovered a sophisticated campaign that is stealing SMS messages. This campaign, known as the SMS Stealer, has been identified in over 105,000 samples, indicating a widespread impact. Key findings from the research include: Insights from Security Experts Jason Soroko, Senior Vice President of Product at Sectigo: According to Soroko, […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.