controlgap.com

Posts about:

Phishing

Cyber Attack Seasons: Key Times When Businesses Are at Risk

While cyber attacks remain a persistent, year-round threat to organizations, cybersecurity professionals have discovered patterns in the frequency and intensity of attacks throughout the year. These attacks are influenced by various factors, including economic cycles, sporting events, and even the seasons. Understanding these patterns can help organizations prepare and reinforce defenses during high-risk periods. Here's a detailed look at when organizations are most vulnerable to cyber attacks.

Read More

The New Google .zip TLD: Examining Potential Cybersecurity Risks

On May 3rd Google introduced several new top-level domains (TLDs), including the .zip TLD which has generated warnings from the cybersecurity community. TLDs are the suffixes at the end of website addresses (such as .com or .org) and play a crucial role in defining a website's identity. Whenever new TLDs emerge, it is essential to evaluate the potential cybersecurity risks they may introduce. This blog post will explore the dangers of the Google .zip TLD and discuss precautionary measures to safeguard against potential threats.

Read More

This Week's [in]Security - Issue 176 | insecurity | Control Gap

Welcome to This Week’s [in]Security. Magecart. ATM Skimming. New breaches: Military, health, SANS. New Ransomware. Facial Recognition. Shame. Robocall honeypot. Disinformation. 0-days. LTE break. Adobe. Citrix. Struts. Motherboards. Wordpress. Cryptanalysis. CRA Credential Stuffing. Linux Malware. BEC. TOR. Phishing. Data Ubiquity. Security Bias. Jobs. Quantum. FireFox. Covid-19: Spread, Curves, Spikes & Waves. Vaccine Progress. And more.

Read More