Browsing: Cyber attacks

Cybersecurity Recovery Costs
  • Cyber recovery costs have over the past one year increased to $2.73 million.
  • The survey included responses from 5,000 IT and cybersecurity leaders in 14 countries, covering organisations with 100 to 5,000 employees
  • Only 1 per cent of claimants said their insurance covered all costs

According to a new report by online security solutions provider Sophos, the recovery costs from cyber-attacks have outpaced insurance coverage.

The survey titled “Cyber Insurance and Cyber Defenses 2024: Lessons from IT and Cybersecurity Leaders,” shows that recovery costs from cyber-attacks are outpacing insurance coverage with only one percent of those that made a claim saying that their carrier funded 100 percent of the costs incurred.

The most common reason for the policy not paying for the costs in full was because the total bill exceeded the policy limit.

According to The State of Ransomware 2024 survey, recovery costs following a ransomware incident increased by …

As Africa turns on more IoT devices, a million attacks abound

Kaspersky honeypots – networks of virtual copies of various internet-connected devices and applications – have detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of the year.

This figure is around nine times more than the number found in H1 2018, when only around 12 million attacks were spotted originating from 69,000 IP addresses. Capitalising on weak security of IoT products, cybercriminals are intensifying their attempts to create and monetise IoT botnets. This and other findings are a part of the ‘IoT: a malware story’ report on honeypot activity in H1 2019.

Cyberattacks on IoT devices are booming, as even though more and more people and organisations are purchasing ‘smart’ (network-connected and interactive) devices, such as routers or DVR security cameras, not everybody considers them worth protecting.

Cybercriminals, however, are seeing more and more financial opportunities in exploiting such gadgets. They …