Cisco's Talos Threat Intelligence team has a good observation. Cybercriminals can just steal CPU/GPU cycles and directly generate any cryptocurrency without infecting the system with ...
Shortly after the Dutch Volkskrant newspaper story about Netherlands Intelligence agencies compromising the prominent Russsian Cozy Bear hacking group and providing the US with ...
By Eric Howes, KnowBe4 Principal Lab Researcher. For most users the experience of dealing with phishing emails is a solitary experience, whether they recognize that they are under attack ...
AlienVault researchers have listed Sofacy, also known as Fancy Bear or APT28, as the most capable hacking group in the world. This was based on ranking the top threat actors which have ...
Lexology had an excellent post from Ogletree Deakins by Rebecca J. Bennett and Danielle Vanderzanden, related to a crafty new phishing scam they warned for and that you should be aware ...
It's suddenly all over the news. In hindsight, it was a matter of "not if, but when". Sophos just warned against a new hybrid worm that combines the ETERNALBLUE exploit and cryptomining. ...
Something positive for a change. This morning we welcomed employee No. 400 at the staff meeting, and for good measure we also asked employee No. 100, 200, and 300 to come on stage too!
The UK government has warned that Britain's most critical industries must boost their cybersecurity or face potentially hefty fines under the EU's Networks and Information Systems ...
Cybersecurity is quickly becoming the number one business priority, says identity and access management company Okta. Based on the results of an analysis of authentication and ...
Heads-up. I am sorry to have to bring up a very distasteful topic, but in the very near future your users will get phishing emails with something close to the ultimate click-bait, luring ...
Our friends at Social-Engineer wrote a great post that we are cross-posting here, because we see the same problem happening more and more! "With the new year come new social engineering ...
This Netflix phishing campaign goes after your login, credit card, mugshot and ID! Paul Ducklin at Sophos wrote: "Think of the big security stories of recent months. Security holes like ...
Click on the Picture to download the full infographic in PDF format Looking at the whole of 2017, there were some interesting shifts on what phishing emails were clicked from quarter to ...
This week, cybersecurity firm Check Point published its regular Global Threat Index. Malware that hijacks workstations to mine cryptocoins has apparently become the most popular infection ...
Trend Micro reported that Business Email Compromise (BEC) is projected to skyrocket as attackers use more and more sophisticated social engineering tactics to trick their targets. The ...
The popularity of bitcoin is creating problems for ransomware criminals wanting to get paid in the skyrocketing cryptocurrency. "We'll see a progressive shift in 2018 towards criminal use ...
Tara Seals at InfoSecurity Magazine had a good summary of Wombat Security Technologies' annual State of the Phish research report. "The war against phishing is still on, with 76% of ...