The European Union’s drug regulator said that COVID-19 vaccine documents stolen from its servers by hackers have been not only leaked to the web, but “manipulated.” [Read More]
According to a Wall Street Journal report, TikTok used a banned tactic to bypass the privacy safeguard in Android to harvest unique identifiers from millions of mobile devices. [Read More]
Personal information on approximately 390,000 Capcom customers, business partners and other external parties possibly compromised in cyberattack. [Read More]
The Accellion service involved in the Reserve Bank of New Zealand breach is called FTA (File Transfer Application) and is used for file sharing. [Read More]
SolarLeaks is offering to sell — for tens and even hundreds of thousands of dollars — files allegedly obtained as a result of the SolarWinds breach. [Read More]
2020 has taught us to revisit the practice of inspecting encrypted traffic. These are all standard security protocols to step up in light of what cybercriminals are doing now.
With law enforcement’s ability to adapt, showing consistent results despite cybercriminals’ adoption of new technologies, as well as the increase in awareness of cyber attacks, there’s still a room for optimism – not only for the next year, but also for the next decade.
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.