Have you secured your remote workforce?
With more organizations adopting remote work, we have witnessed an 8-fold increase in cyber attacks, globally. Relaxed security controls to support remote work, unsecured home WiFi networks, dependence on conferencing platforms, and the deluge of COVID-related scams have made it easier for threat actors to target organizations.
Why should you ramp up your cybersecurity efforts?
Owing to the widespread impact of Coronavirus, remote work has become the new normal. However, the use of home WiFi networks, personal computers, and collaboration platforms has given threat actors a larger attack surface.
Misconfigurations in your vendor’s network could increase the chances of data leakage.
Remote teams, collaborating on code repositories such as GitHub, increase the risk of exposing your source codes.
Unsecured home networks make it easier for attackers to steal your employees’ credentials, and sell them on the dark web.
With increasing COVID-themed malware and ransomware attacks, your confidential data could be exfiltrated to be sold on the dark web.
How can CloudSEK help?
CloudSEK’s ‘XVigil’ is an AI-powered SaaS-based platform that provides specific, actionable, and timely warnings that help you intervene and take swift action, thus preventing costly breaches and losses.
By deploying comprehensive security scans and monitors, XVigil gives you unified supervision, of credential disclosures and data leaks, across the surface web, deep web, and dark web.
COVID related Threat Intelligence
CloudSEK researchers are tracking and monitoring the latest COVID-themed cyber threats across the world. For the latest updates follow our Threat Intelligence feed.
Gamaredon drops emails with malicious attachments that inject malicious macros codes, evades detection. Some of these emails use COVID-19 lures as well.
A campaign that has been active since January 2018, recently released 71 apps that carried malware, takes advantage of the panic caused by the pandemic.
Internal ticketing tool Atlassian JIRA’s unsecured service desks were publicly exposed, allowing attackers to raise internal tickets for multiple departments.