Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

An Autopsy of a $15 Million Heist

A company in the US lost $15 million in a two-month-long business email compromise scam, BleepingComputer reports. Researchers at Mitiga who investigated the attack told BleepingComputer ...
Continue Reading

[On-Demand] Your Organization Through the Eyes of an Attacker

The bad guys are out there, watching and waiting for an opportunity to strike. They are gathering information about your organization and users, devising the perfect plan to infiltrate ...
Continue Reading

The U.N. counterterrorism chief says a 350% increase in phishing websites was reported in Q1 2020

UNITED NATIONS -- A 350% increase in phishing websites was reported in the first quarter of the year, many targeting hospitals and health care systems and hindering their work responding ...
Continue Reading

6000% Increase in Phishing Attacks Leveraging COVID-19, Healthcare Industry Often The Target

On July 3rd just before the holiday weekend, Mount Auburn Hospital's IT team identified suspicious activity. Alarmed, they quickly took steps to disconnect the Cambridge hospital's ...
Continue Reading

[On-Demand Webinar] Hackers Exposed: Kevin Mitnick Shares His Tradecraft and Tools to Help You Hack Proof Your Network

Months of quarantine, transitioning to work from home, economic uncertainty, social and political turmoil… it’s easy to see why your employees are amped up, tense and distracted. And the ...
Continue Reading

It's the Best of 2020! Cyber CSI: Learn How to Forensically Examine Phishing Emails to Better  Protect Your Organization

Roger Grimes' lesson on how to forensically examine phishing emails received the highest viewer rating of any webinar so far this year. In case you missed it, make sure to watch this ...
Continue Reading

The Face of APT Actors

If I were to ask you to picture in your mind a shady criminal organisation consisting of cyber mercenaries, ones that took money from clients, asked no questions, and over the period of ...
Continue Reading

Researchers Uncover Six Years of Russian Attempts to Mold International Politics

Researchers uncover six-years-worth of Russian attempts to mold international politics using fake news and forged documents. Social media research group Graphika published today a ...
Continue Reading

Phony Data Theft, Like Phony Sextortion

Extortionists are sending phony threats to website owners informing them that their sites’ databases will be leaked unless they pay a ransom of between $1,500 and $3,000, BleepingComputer ...
Continue Reading

Fraudsters Are Exploiting Newborns and Recently Deceased People

Criminals are crafting detailed fake identities using data belonging to newly born and recently deceased people, according to Sanjay Gupta, Vice President, Global Head of Products and ...
Continue Reading

[HEADS UP] Cybercriminals in Australia Harass Recipients with Abusive Transaction Descriptions on Bank Statements

There are bad guys in Australia that have given away money in order to use social engineering and harass people with abusive transaction descriptions that appear in online banking ...
Continue Reading

Pandemics, Killer Insects, and Riots Stir Up Cybercriminals

What a year 2020 has been. We have not even gotten half way into the year and we have dealt with a global pandemic, potential murder hornets, protests and riots and even the possibility ...
Continue Reading

How Low Will Cybercriminals Go?

Surely Bond villains only exist in movies -- I mean people aren’t truly evil are they? Especially ones who sit behind a computer. This was part of a discussion I was having with my ...
Continue Reading

Zelle Users Continue to be the Target of Scams Intent on Fraud

The wildly popular payment app is a cybercriminals playground where users are easy prey for money laundering, scams, mules, and just plain old fraud.
Continue Reading

'Florentine Baker Group' Use Microsoft 365 Functionality to Scam Private Equity Firm Out of $1.2 Million

A new investigation by Check Point’s Incident Response Team (CPIRT) demonstrates how brazen cybercriminals are and the lengths they will go to in order to see their scam succeed.
Continue Reading

See me On-Demand at the WSJ Pro Webinar: Covid-19 Themed Cybercrime

On the latest WSJ Pro webinar Rob Sloan, Research Director, WSJ Pro at Dow Jones was  joined by CEO of TruSTAR Patrick Coughlin who discussed tracking all of the Covid-19 themed ...
Continue Reading

See me at the WSJ Pro Webinar - Wednesday 22nd April. 1pm ET / 10am PT.

On the latest WSJ Pro webinar Rob Sloan, Research Director, WSJ Pro at Dow Jones will  be joined by CEO of TruSTAR Patrick Coughlin who will discuss tracking all of the Covid-19 themed ...
Continue Reading

A new ransomware strain called 'Save the Queen’, distributes itself from your own Domain Controllers

Sophisticated cybercriminals have continuously improved the effectiveness of ransomware attacks,  according to Yaki Faitelson, co-founder and CEO of Varonis. In an article for Forbes, ...
Continue Reading

Brand Impersonation Phishing Attacks Grow While Organizations Fail to Protect Their Brand Using DMARC

New data from Security vendor Agari shows how identity deception techniques are being used to fool recipient victims as organizations lack the needed safeguards to ensure emails are ...
Continue Reading

An Intimate Look at a Nigerian Social Engineer

Researchers at Check Point offer a look at a Nigerian citizen who moonlights as a cybercriminal who uses social engineering techniques.  The man, whom the researchers call “Dton,” ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews