Ransomware Moves Away from Consumers
The rise in attacks on local governments and certain industries is about attackers maximizing the return on investments Continue reading Ransomware Moves Away from Consumers
Collaborate Disseminate
The rise in attacks on local governments and certain industries is about attackers maximizing the return on investments Continue reading Ransomware Moves Away from Consumers
With building infrastructure automation, experts are starting to take cyber security seriously and say the average smart building remains open to network attacks Continue reading New Smarts Also Means New Vulnerabilities for Connected Buildings
Organizations are turning to alternatives, ranging from training initiatives to employing fractional CISOs Continue reading How Companies Compensate for the Security-Worker Shortfall
Coming eight years after he launched the site, the steep sentence for the cybercriminal operator is based on a tab of $30 million in damages calculated by Mastercard and other credit card companies. Continue reading Creator of Hub for Stolen Credit Cards Sentenced to 90 Months
Using e-mail addresses and passwords from compromised sites, attackers most often targeted retail sites, video-streaming services, and entertainment companies, according to Akamai. Continue reading Credential-Stuffing Attacks Behind 30 Billion Login Attempts in 2018
Two third-party services left Facebook user data exposed online — in one case, 540 million records of user comments — highlighting the ease with which third-party developers can access data and the risk of lax security. Continue reading Third Parties in Spotlight as More Facebook Data Leaks
Cybercriminals focus on collecting credentials, blackmailing users with fake sextortion scams, and convincing privileged employees to transfer cash. The latter still causes the most damage, and some signs suggest it is moving to mobile. Continue reading Stealing Corporate Funds Still Top Goal of Messaging Attacks
Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected. Continue reading Proof-of-Concept Tracking System Finds RATs Worldwide