LinkedIn Attacks Show Dangers of Professional Networking

Leveraging the human factor via social media to launch cyberattacks is a tried-and-true method, and one that will be with us for many more years to come. The recent LinkedIn attacks, where malicious actors used fake profiles linked to hostile states t… Continue reading LinkedIn Attacks Show Dangers of Professional Networking

Credential Stuffing: AI’s Role in Slaying a Hydra

One data breach can lead to another. Because so much of the data stolen in breaches ends up for sale on the dark web, a threat actor can purchase authentication credentials — the emails and passwords — of the organization’s employees without having to steal them directly. With that information in hand, threat actors have […]

The post Credential Stuffing: AI’s Role in Slaying a Hydra appeared first on Security Intelligence.

Continue reading Credential Stuffing: AI’s Role in Slaying a Hydra

Ticketmaster Coughs Up $10 Million Fine After Hacking Rival Business

Several Ticketmaster executives conspired a hack against a rival concert presales firm, in attempt to ‘choke off’ its business. Continue reading Ticketmaster Coughs Up $10 Million Fine After Hacking Rival Business

Protecting Healthcare Data and Infrastructure

The healthcare industry is increasingly targeted by cybercriminals. As digital transformation accelerates and more providers move their internal systems to the cloud, deploy IoT medical devices and host medical records online, they become even more vu… Continue reading Protecting Healthcare Data and Infrastructure

Lottery hacker gets 9 months for his £5 cut of the loot

We don’t care how little you made from your crimes, the judge said. We care that you went after an outfit that gives a ton to charities. Continue reading Lottery hacker gets 9 months for his £5 cut of the loot