Many manufacturing executives worry about ransomware attacks but fail to recognize the threat of information theft and fileless attacks, which account for nearly 60% of attacks, a Morphisec report states.
While the statistics show that the manufacturing sector needs to be more vigilant, efforts also need to be put toward training employees and leveraging threat intelligence to improve cyber readiness.
The 2021 Manufacturing Cybersecurity Threat Index study found 57% of the 567 manufacturing employees surveyed are more worried today about their organization being targeted to gain IP by cybercriminals than they were a year ago.
As cyber criminals target manufacturers it is time for leaders to address inadequate security postures.
Recent attacks targeting intellectual property (IP) and critical infrastructure are raising the security stakes for manufacturing organizations, as the industry records one of the highest attack rates of any sector since the onset of COVID-19.
1-in-5 manufacturing companies in the US and UK have been victims of a cyber attack in the last 12 months, according to the 2021 Manufacturing Cybersecurity Threat Index released by Morphisec
Information-stealing malware makes up about a third of attacks, a study finds, but companies worry most about ransomware shutting down production.
The ‘Egregor’ ransomware group is one of the most active, successful, and intimidating out there, rising in notoriety quickly thanks to its uncompromising extortion mechanism, solid infection methods, and strong encryption scheme. Morphisec has decided to take a deeper look into how the group operates, its techniques for initial access, persistence, and exfiltration, and whether there’s any evidence linking them with other groups that had similar success in the past.
The COVID-19 pandemic, which accelerated many companies’ transition to remote work, will sooner or later come to an end, but research by the McKinsey Global Institute confirms what many businesses and remote workers already suspect will likely happen — “remote work will continue after the pandemic, primarily in hybrid forms.”
Researchers at Morphisec Labs have published fresh details about a malware variant called JSSLoader that the FIN7 hacking group has used for several years.
Experienced Marketing Leader Joins Cybersecurity Vendor to Drive Market Share and Brand Awareness BE’ER SHEVA, ISRAEL AND ...
VP of Product at Morphisec recognized at the prestigious Black Unicorn Awards BE’ER SHEVA, ISRAEL & BOSTON --AUGUST 02, ...
Morphisec CTO & Head of Threat Research recognized at the prestigious Black Unicorn Awards BE’ER SHEVA, ISRAEL, AND BOSTON ...