exclusive content

Spear Phishing: Top Threats and Trends

Key findings on the latest social engineering tactics and the growing complexity of attacks Cybercriminals are constantly refining their tactics and making their attacks more complicated and difficult to detect. In this in-depth report, Barracuda researchers share their insights on the most recent trends in social engineering and the new methods attackers are using to […]

The new ABCs of application security

Applications are the building blocks of how digital businesses work and how they engage with their end users and customers. The move to remote work in 2020 intensified the importance of web apps, and many organizations have had to pivot rapidly to upgrade their existing web services, expose older applications over the internet, or deploy […]

Don’t pay the ransom

In simple terms, ransomware is malicious software that either encrypts your data or otherwise stops you from accessing your own systems. The criminals then demand a ransom in exchange for the decryption key, although, of course, there is no guarantee that the key will work and you will get your data back. Many victims have […]

3 steps to easily manage and secure privileged access.

Effective management of privileges and credentials is essential for the security of your organisation. With 74% of data breaches happening due to privileged credential abuse, it’s an area that organisations must address. Cyber attackers can abuse credentials through several methods. The main approaches are social engineering and phishing, exploiting poor password hygiene and password reuse, […]

Zero Trust Network Access: Barracuda’s ultimate guide.

The cybercrime threat landscape is more saturated than ever, with attacks growing in sophistication and successfully hitting organisations in every sector. What’s also growing is the financial damage to these businesses: IBM Security reported a 10% increase in the average total cost of a breach from 2020-2021 — the largest increase in a single year […]

The risk of ransomware to Microsoft 365 data

The ransomware threat landcsape Ransomware attacks have consistently hit the headlines in recent years, causing serious reputational and financial losses for organisations in every industry. Ransomware attackers ruthlessly seize data from compromised companies, encrypt the data taking systems offline, extort pay outs to restore access and blackmail companies to prevent stolen data from being publicly […]

Effective application security requires holistic, quick, and continuous protection

Application security threats are ever present. In 2020, the National Vulnerability Database (NVD) reported over 18,000 vulnerabilities — setting a new record. Alarmingly, over 10,000 of these vulnerabilities were labelled as critical or high severity. At the same time, attackers continue to exploit well-known vulnerabilities. Joint research from the US’ Cybersecurity and Infrastructure Security Agency […]

DDoS Threat Landscape Report: DDoS Trends from Q4 2022

Welcome to Cloudflare’s quarterly distributed denial-of-service (DDoS) report for the fourth and final quarter of 2022. This report uncovers insights and trends about the DDoS threat landscape observed across Cloudflare’s global network from October to December of 2022. As the year drew to a close and billions around the world celebrated holidays, DDoS attacks persisted. […]

5 critical considerations for mitigating DDoS attacks

A DDoS attack is a malicious attempt to disrupt a targeted server, service, or network by overwhelming it with a flood of Internet traffic. To be effective, these attacks require threat actors to take control of online computers, routers, IoT devices, or other endpoints to leverage as sources of attack traffic. These machines are infected […]