Panel: How Hackers Used and Abused the Pandemic to Profit
How Hackers Used and Abused the Pandemic to Profit
In a year like no other, the world has faced unprecedented change and challenges, with the impact of the COVID-19 pandemic affecting so many aspects of everyday life. During such a period of difficulty, scammers and malicious actors have sought to exploit the health crisis for their own means.
Whether it has been through targeting business support or tax relief schemes, bludgeoning healthcare organizations with attacks or seeking to sow the seeds of fear and doubt in vaccine efforts, fraudsters have implemented various techniques for profit and gain at the expense of a global community under immense pressure.
In this session, a panel of experts will reflect on the various ways in which hackers have targeted the pandemic over the past 12 months, lifting a lid on the methods employed and outlining how businesses and users can best protect themselves from ongoing COVID-related attacks, scams and fraudulent activity.
Key takeaways:
– How the COVID-19 pandemic has been maliciously exploited for profit and gain
– Insight into some of the standout criminal campaigns detected over the last year
– How the security community can help protect organizations as they recover from the pandemic
Similar Posts
The Security Podcast In Silicon Valley
Join us in this episode of the Security Podcast in Silicon Valley, where host Jon McLachlan sits down with Kayne McGladrey, Field CISO at Hyperproof. shares his unique journey from theater to cybersecurity, offering insights into risk management, regulatory compliance, and the evolving landscape of cyber threats. Discover how his background in improv and theater has shaped his approach to cybersecurity, the importance of SEC 10-K disclosures, and practical advice for startups and security professionals. Don’t miss this engaging and informative conversation!
Is my medical device vulnerable to cyber threats?
It is a matter of whether the threat actor has sufficient resources (both staffing and financial resources) and the motivation. The real question is about the likelihood of a threat: an always-on internet-connected medical device will have a very different threat profile than a medical device that requires direct physical access.
FBI warns of ‘devastating’ cyber attacks on IoT networks
As Kayne McGladrey, the Director of Information Security Services at Integral Partners, the cyber security, access and identity management specialist company headquartered in Boulder, Colorado, says, “IoT security remains one of the most challenging security vulnerabilities to businesses and consumers. The Mirai and Reaper botnets are results of threat actors leveraging poor security controls on IoT devices, building attack infrastructure out of those devices, and using that stolen infrastructure to attack organinations. Companies and organisations purchasing IoT/IIoT devices should treat them the same as any other endpoint device connecting to the corporate network.”
KXL-FM (Portland, OR) Radio Interview
Tune in KXL-FM (Portland, OR) at 4 PM Pacific for a discussion on the intersection of cyber security, agriculture, and the cloud.
The Year of Global AI and Cybersecurity Regulations: 7 GRC Predictions for 2025
As 2025 approaches, emerging regulations and laws will affect how CISOs strategize and protect their organizations. With the increasing complexity of global compliance frameworks, understanding these changes is crucial for maintaining security and operational efficiency. Let’s discuss what I expect regarding regulatory shifts and their implications in 2025 and explore what CISOs and CCOs should prepare for in the coming year.
Insider Threats: A Big Fear for Small Businesses
This goes hand in hand with the increasing number of vendors, solutions and buzzword technologies. There’s a fear that an SMB will buy the solution that solves a problem defined by a venture capitalist and not address a genuine threat to their business.