5 Most Devastating Cyber Attacks | Cybersecurity Insights #18

5 Most Devastating Cyber Attacks | Cybersecurity Insights #18

How did a teenage boy cause one of the most devastating computer hacks of all time? This episode of Cybersecurity Insights, from Absolute Software, looks at recent cyber-attacks that made the news and have helped to make cyber-attacks one of the biggest threats to national security.

5 Most Devastating Cyber Attacks Countdown:
Cyber-attacks come in many forms, from all directions, and from incredibly different sources. One thing is for sure – they create serious damage and are not slowing down.

Here are some of our favorites top 5 cyber-attacks:
#5: “Mafiaboy’s” Denial of Service
#4: Conficker and the worm that exploited Windows’ OS
#3: Jonathan James (1999) with the US Department of Defense breach
#2: Sony Pictures hacked by the Guardians of Peace (GOP) using Shamoon malware
#1: Melissa virus by David Smith aka the discoverer of phishing attacks

How to Prevent Cyber Attacks?
Attacks are inevitable. Successful attacks are not. By maintaining line-of-sight of all devices and ensuring security controls are always present and working as intended, the attack surface is reduced and becomes an inhospitable place for attackers.

Read “Most Devastating Cyber-Attacks At The Endpoint” blog post to learn more: https://blogs.absolute.com/most-devastating-cyber-attacks-at-the-endpoint/

—-

Watch more episodes of the Cybersecurity Insights series:
#1 – HIPAA Privacy Rule – https://www.youtube.com/watch?v=FtdvOVh3u28&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#2 – HIPAA Security Rule: https://www.youtube.com/watch?v=cMI_JyiMR9Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=2
#3 – HITRUST Cybersecurity Framework: https://www.youtube.com/watch?v=QLu9zcclHo4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=3
#4 – NIST Cybersecurity Framework: https://www.youtube.com/watch?v=hBpB5Z-Wl6w&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=4
#5 – NIST CSF – Identify: https://www.youtube.com/watch?v=2pCNYNPs-70&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=5
#6 – NIST CSF – Protect: https://www.youtube.com/watch?v=gdWv3NJKzSs&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=6
#7 – NIST CSF – Detect: https://www.youtube.com/watch?v=0VdtW3Ue3F8&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=7
#8 – NIST CSF – Respond: https://www.youtube.com/watch?v=7VwS3HTAW1M&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=8
#9 – NIST CSF – Recover: https://www.youtube.com/watch?v=94ED4iPB36o&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=9
#10 – Lost/Stolen Device: https://www.youtube.com/watch?v=QYgYTZPnU-Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=10
#11 – Data Privacy explained: https://www.youtube.com/watch?v=3YIPQrEWOeY&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=11
#12 – Data Privacy laws: https://www.youtube.com/watch?v=v9I8iDLFtqE&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#13 – Data Privacy Tips: https://www.youtube.com/watch?v=KyAyni3SJmU&index=1&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW
#14 – Top Cybersecurity Threats: https://www.youtube.com/watch?v=ZZ5R1diN0OI&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#15 – Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware: https://www.youtube.com/watch?v=aOy9SQxnHKA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#16 – Zombie Computers, Botnets, and Denial of Service Attacks Explained https://www.youtube.com/watch?v=r-PRBdsEQZA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#17 – Zero Trust Explained: https://www.youtube.com/watch?v=7Oeo1A5gncQ&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#18 – 5 Most Devastating Cyber Attacks: https://www.youtube.com/watch?v=IJc3viPKXk4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#19 – Dealing with IT Complexity: https://www.youtube.com/watch?v=6kvas8uqMuk&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1

—-

2019 Endpoint Security Trends Report. New data security threats revealed from global study of six million devices: https://www.absolute.com/en/go/study/2019-endpoint-security-trends?utm_medium=video&utm_source=youtube&utm_campaign=risk-mgmt

Find out more about how Absolute Software can help: https://www.absolute.com/en/platform/endpoint-hygiene?utm_medium=video&utm_source=youtube&utm_campaign=risk-mgmt

4 Comments

Leave a Reply

Your email address will not be published.


*