New research from cybersecurity vendor Akamai has revealed that 12.3% of monitored devices communicated with domains associated with malware or ransomware at least once during the second quarter of 2022. This represented a 3% increase compared to Q1 2022, the firm stated, with phishing toolkits playing a key role in malicious domain-related activity. The findings are based on DNS data and Akamai’s visibility into carrier and enterprise traffic across different industries and geographies.
Increased malware, phishing, C2 domain activity detected in Q2 2022
In a blog post detailing its research, Akamai stated that, in addition to the devices it detected communicating with domains associated with malware/ransomware, a further 6.2% of devices accessed phishing domains with 0.8% accessing command-and-control (C2)-associated domains (both small increases on Q1 2022). “While this number might seem insignificant, the scale here is in the millions of devices,” the firm wrote. “When this is considered, with C2 being the most malignant of threats, this is not only significant, it’s cardinal.”
This year is already off to a flying start and we’re delighted that so many outstanding Wi-Fi companies big and small have chosen to work with us in 2024. Here – in no particular order – are seven new additions to our Wi-Fi NOW partnership list, which we believe is the world’s premier community of Wi-Fi industry leaders. We will of course be working closely with all our partners new and old through the year to showcase their outstanding contribut...
A common refrain in cybersecurity circles is that humans are your weakest link. There’s truth in this, but making this the focal point of your cybersecurity training and culture can sometimes have unintended consequences.