Discover our in-depth analysis and expert insights into the latest cybersecurity trends, threats, and solutions. Stay ahead of the curve and keep your organization safe using the comprehensive and actionable information on this page provided by our experienced team of analysts and researchers. From data breaches to emerging technologies, we cover it all.

Cybersecurity threatscape: Q1 2024

In Q1 2024, the number of incidents increased by 7% compared to the previous quarter. One of the most common consequences of successful cyberattacks was again the leak of confidential information—72% for individuals and 54% for organizations. Attackers more frequently used malware against individuals: the share of such incidents increased by 9% compared to the previous quarter, reaching 68%. In successful attacks on organizations, we see a reduction of 11% in the use of ransomware compared to the previous quarter (from 54% to 43%). Meanwhile, there was an increase in the use of remote access tools by attackers in attacks on both organizations (32%) and individuals (37%): an increase of 10% and 27% respectively compared to the previous quarter. Social engineering remains the most dangerous threat for individuals, accounting for 85% of such incidents, and one of the most popular attack vectors on organizations, accounting for 52%.
Continue reading

Security of quantum technologies in IT

The processing power of traditional computers grows by the year. Transistor and microchip technology keeps evolving. Still, certain categories of mathematical problems remain far too complex for even the most powerful supercomputers to solve. The global community is researching technologies that can boost processing power and help to find more efficient ways of delivering sought-after solutions. Quantum computing is one of those evolving areas.
Continue reading

The rise of autonomous SOCs: embracing AI-powered security operations for the ever-evolving threat landscape

For several years, the main challenges faced by traditional security operations Center (Soc) are increased and they have an impact on the overall effectiveness of information security incidents monitoring and response process. At the global level, there is a necessity to create new generation SoCs, capable to meet modern challenges. In this research, we talk about the key characteristics that new generation SOC should have in order to provide effective protection against modern cyber threats.
Continue reading

Cyberthreats in the transportation industry

Transportation is a key economic sector. It spans a multitude of diverse companies engaged in logistics, urban transit, land and air cargo and passenger conveyance, and other activities. The transportation system performs critical functions that support nationwide objectives by connecting different areas of a country and sectors of the economy. Carriers also do business with large numbers of individuals and organizations involving significant funds. This is why transportation sector organizations attract the attention of both politically and financially motivated malicious actors as a key target for cyberattacks. According to our data, transportation was once again one of the 10 most targeted industries in 2023. This study looks at how malicious actors operate when they attack transportation sector companies, what consequences companies face as a result of these attacks, what cyberthreats can inflict irreparable damage, and most importantly, how to prevent these events from happening.
Continue reading

How APT groups operate in the Middle East

The Middle East regularly faces attacks from APT groups—cybercriminal groups carrying out multi-stage, carefully planned attacks targeting a specific industry or group of industries. Their objective in the Middle East is to obtain information that can provide political, economic, and military advantages. Some APT groups have also been observed in hacktivist campaigns and operations aimed at sabotage. Positive Technologies has conducted a comprehensive research into the activities of the APT groups targeting organizations in the Middle East. In this article, we will discuss the tactics and techniques, which are commonly used by APT groups in the Middle East, and offer recommendations to strengthen region's protection from sophisticated targeted attacks.
Continue reading

Get in touch

Fill in the form and our specialists
will contact you shortly