Cyber Threat Bulletin 2020-04

April 2020

Cyber Security Update

Cyber Security Update - April 2020

SoftwareONE believes there is a need for additional information when it comes to cybersecurity, as organizations have made it clear that investment in a proper security strategy is paramount. SoftwareONE’s monthly Cyber Threat Bulletin provides updates on the most recent threats, the latest breaches and how to react to them in order to stay on top of malware and ransomware threats.

Stay Ahead Of Cyber Threats - April Bulletin

These days we are living in strange times. And strange times are forcing us to develop new ways of agility, redefining our working models and developing a new normal -- which means for many of us, working at home. However, the success of working from home doesn’t come easily and there are many challenges one has to cope with – starting from finding a quiet spot to take phone calls to creating a proper work-life harmony within your four walls. But, certainly one of biggest challenges – and the easiest one to overlook – maintaining security.

You may have seen similar contributions in the news and on social media nowadays – people sharing pictures of their workplaces at home, showing off private kitchens, living rooms or garden areas, and even politicians filming their screens while having video conferences, exposing meeting IDs and user names. Security rules and data protection processes seemingly thrown out the proverbial window. What now seems common is a true nightmare for all security and IT workers. It’s like serving the favorite meal for cybercriminals on a silver platter – sensitive data.

Phishing Attacks & Credit Card Skimming on the Rise

These strange times are the times when cybercriminals thrive, waiting for the next big attack to be deployed. And cybercrime never sleeps. Especially during the past weeks we have seen myriad of attacks where hackers (successfully) tried to steal personal data that could then be offered for sale on the darknet:

Of course, the pandemic is only one angle attackers use to get through firewalls and exploit privacy settings. We also see other attacks arise threatening security standards and requiring continuous monitoring and education strategy:

Last but not least there is still light at the end of the tunnel: As reported by BBC a mystery hacker allegedly stole $25m (£20m) in crypto-currencies - and then returned the funds two days later. So, always expect the unexpected. And #becybersmart.

Be prepared & protect your digital assets

As you can see there are a couple of attacks you should be aware of and prepared for. While you cannot extinguish all fires at once it’s important to regularly monitor current threats and attacks and prepare your business for any cyberthreat that might arise.

We have collected further data breaches, cyber threats and awareness news in our April Cyber Threat Bulletin. Get your copy here and keep yourself up-to-date.

  • Managed Security, Cybersecurity, Cyber Threat Bulletin
  • Cyber-Threats

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment


Bala Sathunathan

Bala Sethunathan

Director, Security Practice & CISO


Related Articles

Cloud Workload Security: Should You Worry About It?

Cloud Workload Security: Should You Worry About It?

We’re breaking down how cloud workload security works, the common risks associated with cloud workloads, and steps to ensure the security of your cloud workload.

  • 18 March 2021
  • Bala Sethunathan
  • Managed Security
  • Penetration Testing, Cybersecurity

How to Prevent Cyber Attacks through Penetration Testing

Penetration testing imitates a cyberattack to help assess security measures - and new advances in automation are changing the game. Learn more.

What is the focus of your Java strategy?
  • 25 June 2020
  • Massimo Borrelli
  • Managed Security, Publisher Advisory
  • Oracle, Java, Strategy

Where is the Focus of Your Java Strategy?

Compliance, Security, Costs: The key elements of a solid Java licensing strategy.