Month: May 2020

Corporate social media account takeovers are an increasingly common occurrence, affecting the likes of politicians, celebrities, brands, other high-profile accounts and even Mark Zuckerberg, the father of the social media revolution. However, no study has been performed to analyze the prevalence, cost, motivations, and methodology of such attacks. Understanding these would be incredibly helpful for defence; for example, it could be used for effective distribution of preventative efforts. To that end, ZeroFOX Research has investigated successful account takeovers against celebrities and organizations in the past 4 years and aggregated pertinent details into this white paper. ZeroFOX also considered attacks to regular accounts and small business accounts, which is detailed in the conclusion. These attacks are less costly than those covered in the body of the study, but occur much more frequently.


  • A detailed survey of 347 high-profile accounts compromised over the past 4.5 years
  • A breakdown of hackers motivations, including money, political messages,  and just 'for the lulz'
  • Common attacker tactics, techniques, & procedures and methods of breaking into a high-value account
  • Best practices for securing your accounts on social media

Get your copy of the report by filling in the form below.



    Cloud-based SIEM offers unique benefits while delivering the security you expect.

    Your organisation must remain secure as it grows. But cybersecurity is harder – and more expensive – than ever to keep current. Talent shortages, equipment costs, version control and maintenance are constant challenges. A cloud-based SIEM addresses those challenges without compromising security.

    The benefits of the cloud are attracting an ever-increasing range of business operations.

    Now it's possible to take SIEM to the cloud with the security and functionality you need. LogRhythm Cloud brings together the business benefits of cloud, the security you rely on and the unique benefits that only the cloud can deliver.

    Download our guide to discover cloud-based SIEM without compromise with LogRhythm.


      Government and commercial entities are constantly on alert to prevent and fight against ongoing threats of cyber attacks. The dichotomy faced by today's enterprises is that in order to protect themselves against these threats they must also increase collaboration and sharing of information across sensitivity levels within their own organizations, as well as across government and corporate boundaries. In light of this, network security is of paramount significance especially with the keen emphasis currently placed on secure collaboration and information sharing in an environment of increasing threats and vulnerabilities.

      In this whitepaper, we will discuss how Forcepoint Next-Generation Firewall (NGFW) provides some key network capabilities, though it fails to perform extensive inspection of data in transit for a wide variety of policies. Software guards, such as Forcepoint Data Guard, provide unparalleled capabilities to mitigate threats and implement the precise controls required an environment. We will take a closer look at both NGFW and Guards to help clarify when one is preferable to the other, as well as when it is wise to utilize both to provide complete protection.


        All users—whether they’re your employees, vendors, or partners—expect to access the applications and services they need from any device, anywhere. This presents challenges in device management, but also device security as phishing attacks become more sophisticated. In this infographic, learn about these core challenges, and how the Okta Devices platform helps secure your users.

        Enhance Your Security Posture with Okta Devices.


        Twenty-eight percent of all organisations worldwide were impacted by malicious multi-purpose botnets and targeted ransomware attacks rose by 20% according to Check Point Research, the Threat Intelligence and Research arm of Check Point Software.

        The 2020 Cyber Security Report highlights the trends cyber-criminals use to attack organisations worldwide across all industries, and gives cyber security professionals and C-Level executives the information they need to protect their organizations from fifth-generation cyber attacks and threats.

        Report highlights include:

        • Details on the rise in cloud attacks and the change in mobile security threats
        • How botnet armies surged more than 50%
        • A deep dive into the severity of targeted ransomware attacks
        • How Magecart attacks became an epidemic

        Prevent upcoming cyber attacks by adopting the strategies and recommendations in the 2020 Cyber Security Report today.

          • 1
          • 2