
Cyberattacks are no longer driven mainly by software vulnerabilities. They are increasingly driven by identity compromise. According to Sophos, identity-based attacks now account for a majority of incident response cases, with attackers using valid credentials in many breaches. In fact, in over 56% of cases, attackers logged in rather than broke in. At the same […]
Cybersecurity has always been a step ahead game. Defenders build controls, attackers find gaps, and the cycle continues. But something changed over the last couple of years. The rules of that game are no longer the same. Organizations spent years strengthening firewalls, patching vulnerabilities, and deploying endpoint protection. Yet, despite these investments, breaches are not […]
Healthcare organizations have become frequent targets for ransomware groups. The alleged Royal Bahrain Hospital cyberattack is another example of how sensitive medical data and critical services attract cybercriminals. The Payload ransomware group recently claimed responsibility for breaching the systems of Royal Bahrain Hospital (RBH) in Bahrain. According to the threat actors, they stole around 110 GB […]