Cyber Threat Bulletin 2020-04

April 2020

Cyber Security Update

Cyber Security Update - April 2020

SoftwareONE believes there is a need for additional information when it comes to cybersecurity, as organizations have made it clear that investment in a proper security strategy is paramount. SoftwareONE’s monthly Cyber Threat Bulletin provides updates on the most recent threats, the latest breaches and how to react to them in order to stay on top of malware and ransomware threats.

Stay Ahead Of Cyber Threats - April Bulletin

These days we are living in strange times. And strange times are forcing us to develop new ways of agility, redefining our working models and developing a new normal -- which means for many of us, working at home. However, the success of working from home doesn’t come easily and there are many challenges one has to cope with – starting from finding a quiet spot to take phone calls to creating a proper work-life harmony within your four walls. But, certainly one of biggest challenges – and the easiest one to overlook – maintaining security.

You may have seen similar contributions in the news and on social media nowadays – people sharing pictures of their workplaces at home, showing off private kitchens, living rooms or garden areas, and even politicians filming their screens while having video conferences, exposing meeting IDs and user names. Security rules and data protection processes seemingly thrown out the proverbial window. What now seems common is a true nightmare for all security and IT workers. It’s like serving the favorite meal for cybercriminals on a silver platter – sensitive data.

Phishing Attacks & Credit Card Skimming on the Rise

These strange times are the times when cybercriminals thrive, waiting for the next big attack to be deployed. And cybercrime never sleeps. Especially during the past weeks we have seen myriad of attacks where hackers (successfully) tried to steal personal data that could then be offered for sale on the darknet:

Of course, the pandemic is only one angle attackers use to get through firewalls and exploit privacy settings. We also see other attacks arise threatening security standards and requiring continuous monitoring and education strategy:

Last but not least there is still light at the end of the tunnel: As reported by BBC a mystery hacker allegedly stole $25m (£20m) in crypto-currencies - and then returned the funds two days later. So, always expect the unexpected. And #becybersmart.

Be prepared & protect your digital assets

As you can see there are a couple of attacks you should be aware of and prepared for. While you cannot extinguish all fires at once it’s important to regularly monitor current threats and attacks and prepare your business for any cyberthreat that might arise.

We have collected further data breaches, cyber threats and awareness news in our April Cyber Threat Bulletin. Get your copy here and keep yourself up-to-date.

  • Managed Security, Cybersecurity, Cyber Threat Bulletin
  • Cyber-Threats

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment


Bala Sathunathan

Bala Sethunathan

Director, Security Practice & CISO


Related Articles

  • 14 June 2021
  • Bala Sethunathan
  • Managed Security, Cybersecurity User Awareness, Cyber Threat Bulletin, Cybersecurity

Cyber Security Update May 2021

At present, cloud misconfigurations present a high data breach risk. Get to know these best practices that help to secure your cloud-based assets.

Getting Started with FinOps: Why Cloud Security is Your Step Zero | SoftwareONE Blog

Getting Started with FinOps: Why Cloud Security is Your Step Zero

Whether you’re looking to control costs arising from cloud workloads, fraud, or data breaches, cloud security is the important step zero before starting with FinOps. Learn more.

How to Avoid Ransomware Attacks to Better Protect Hyperscale Environments
  • 26 May 2021
  • Bala Sethunathan
  • Managed Security, Cybersecurity User Awareness, Cybersecurity

How to Avoid Ransomware Attacks to Better Protect Hyperscale Environments

Ransomware attacks come in many shapes and forms and can be extremely damaging to an organization. Learn how to protect your hyperscale environment.