article thumbnail

Holiday Hacking: Watch Out for These Deceptive Tricks

NexusTek

It is believed that the credentials were harvested from a device belonging to one of Uber’s contractors, after the device was infected with malware by the original threat actors. Once inside, the hackers were able to download information from one of Uber’s finance tools.

article thumbnail

The CISOs Guide to Storage & Backup Cyber Resiliency

Solutions Review

Despite implementing vulnerability management, extended detection and response (XDR), threat monitoring, security information and event management (SIEM), and other technologies, they always seem to be one step behind the cybercriminal fraternity. That means they are wide open to attack from ransomware and other forms of malware.

article thumbnail

3 Things Every Organization Should Do to Protect Against Cybercriminals

Risk Management Monitor

Whether it is phishing scams or malware, hackers are constantly finding new ways to attack businesses. Investing in threat-monitoring and endpoint protection tools can also help. Cybersecurity should be a top priority for organizations today, especially as employees continue to work remotely without business-grade protections.