A Russian-speaking threat actor has been targeting hundreds of industrial enterprises for more than two years, their main goal being to steal money. [Read More]
A threat actor specializing in business email compromise (BEC) attacks has been spotted exploiting a vulnerability to spoof the domains of Rackspace customers. [Read More]
JM Bullion has informed some customers that their payment card information may have been stolen by hackers, but the disclosure came months after the breach was discovered. [Read More]
A database with information on virtually the entire US voting population has been circulated on hacker forums, opening up the potential for disinformation and scams. [Read More]
Google says its Threat Analysis Group (TAG) hasn’t observed any significant coordinated influence campaigns that are targeting United States voters on its platform. [Read More]
Law enforcement agencies in 16 countries worked together to dismantle a criminal network involved in the laundering of money from high-level cybercriminals. [Read More]
Hack-for-hire group BAHAMUT managed to build a fake online empire to leverage in cyber-espionage operations targeting the Middle East and other regions around the world. [Read More]
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.