How Falling Crypto Prices Impacted Cyber Crime

Some rare good news in the world of cyber crime trends: Certain crimes declined in 2022 after years of constant rises. Should we credit crypto? Some estimates say that cryptocurrencies have lost $2 trillion in value since November 2021. During that time, the costs associated with cyber crimes, such as ransomware payouts and financial scams, […]

The post How Falling Crypto Prices Impacted Cyber Crime appeared first on Security Intelligence.

Continue reading How Falling Crypto Prices Impacted Cyber Crime

Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP”

September’s Patch Tuesday unveiled a critical remote vulnerability in tcpip.sys, CVE-2022-34718. The advisory from Microsoft reads: “An unauthenticated attacker could send a specially crafted IPv6 packet to a Windows node where IPsec is enabled, which could enable a remote code execution exploitation on that machine.” Pure remote vulnerabilities usually yield a lot of interest, but […]

The post Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP” appeared first on Security Intelligence.

Continue reading Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP”

Cybersecurity Trends: IBM’s Predictions for 2022

After the challenging year of 2021, we look forward to what’s next in 2022. Over the past two years, we’ve seen a tremendous shift in how consumers and businesses accomplish tasks with the continued shift to digital and cloud. As a result of disappearing perimeters and increased digital data, cybersecurity attacks have, not surprisingly, increased. […]

The post Cybersecurity Trends: IBM’s Predictions for 2022 appeared first on Security Intelligence.

Continue reading Cybersecurity Trends: IBM’s Predictions for 2022

An Attack Against Time

When Liza Minnelli sang that famous tune, “Money makes the world go around,” she should have added one more word: time. Time makes the world go around. It’s that one agreed-upon part of life that the world shares. From laptops to phones to wall clocks to just about every other technology, time is everywhere, controlling […]

The post An Attack Against Time appeared first on Security Intelligence.

Continue reading An Attack Against Time

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. […]

The post DDoS Attacks Increase in Size, Frequency and Duration appeared first on Security Intelligence.

Continue reading DDoS Attacks Increase in Size, Frequency and Duration

What Is a DDoS Attack?

After 20 years, distributed denial-of-service (DDoS) attacks can still result in critical damage to businesses. Learn more about how to mitigate a DDoS attack on your corporate network.

The post What Is a DDoS Attack? appeared first on Security Intelligence.

Continue reading What Is a DDoS Attack?

About That IoT Device You Received as a Holiday Gift…

An IoT device can be extremely useful in your everyday life, but like all technologies, it still has flaws and can add to your risk profile.

The post About That IoT Device You Received as a Holiday Gift… appeared first on Security Intelligence.

Continue reading About That IoT Device You Received as a Holiday Gift…

The Decline of Hacktivism: Attacks Drop 95 Percent Since 2015

Despite the rise in vulnerability reporting, cryptojacking attacks and attacks on critical infrastructure, one threat trend has been on the decline.

The post The Decline of Hacktivism: Attacks Drop 95 Percent Since 2015 appeared first on Security Intelligence.

Continue reading The Decline of Hacktivism: Attacks Drop 95 Percent Since 2015

The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns

Holiday spending is on the rise both in-store and online. How can retailers ensure PCI compliance to manage large transaction volumes and post-holiday refunds?

The post The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns appeared first on Security Intelligence.

Continue reading The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns

Why You Need a BGP Hijack Response Plan

BGP hijack attacks are increasing in popularity, but are still largely unaddressed in many organizational incident response plans.

The post Why You Need a BGP Hijack Response Plan appeared first on Security Intelligence.

Continue reading Why You Need a BGP Hijack Response Plan