Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

The Hackers Smell Blood Now, Not Silicon

Steve Morgan wrote an excellent post with the Top 5 cybersecurity facts, figures and statistics for 2017 at the CSO site. These predictions and observations provide a 30,000-foot view of ...
Continue Reading

Two New Cybercrime-as-a-Service Platforms Discovered

There is a rising trend of cybercrime sites for wannabe "crims" that make malicious hacking a point-and-click exercise. A new report describes two more sites that were discovered by ...
Continue Reading

[ALERT] NotPetya Is a Cyber Weapon, Not Ransomware

Yesterday morning, after monitoring this new outbreak for 24 hours, I came to the conclusion we were dealing with cyber warfare , and not ransomware . Two separate reports coming from ...
Continue Reading

We Are Dealing With Cyber Warfare Here

OK, after 24 hours of monitoring this new Petya ransomworm outbreak, I am calling it. This has been brewing under the surface for a few years, but now we are dealing with open cyber ...
Continue Reading

Vladimir Putin Approves Of Patriotic Russian Hackers

The WSJ just posted a very interesting article by Nathan Hodge confirming what we have been saying here for the last few years. Russian President Vladimir Putin suggested in St Petersburg ...
Continue Reading

Shadow Brokers Offer New SaaS 0-Day Threat Subscription Model

The mysterious Shadow Brokers – the hackers who leaked the NSA SMB zero-day exploit that powered WanaCry into the world's worst ransomworm – are back, and could cause even more damage. In ...
Continue Reading

NIST Releases Update to Cybersecurity Framework

The National Institute of Standards and Technology (NIST) has issued a draft update (PDF) to the Framework for Improving Critical Infrastructure Cybersecurity—also known as the ...
Continue Reading

Chinese Hackers Use Fake Cellphone Tower to Spread Android Banking Trojan

Check Point Software blogged about Chinese hackers who have taken smishing to the next level, using a rogue cell phone tower to distribute Android banking malware via spoofed SMS messages.
Continue Reading

Does DoubleAgent Turn Antivirus Into Malware? We Are Calling BS On That.

It was all over the press. Initially reported by Bleepingcomputer and picked up by sites like Endgadget, they all went gaga over a new technique that allows the bad guys to take over your ...
Continue Reading

Mandiant M-Trends 2017: "Cybercrime Skills Now On Par With Nation States"

There was some good news reported in Mandiant's M-Trends 2017 report, but this was heavily outweighed by a lot of very bad news. Mandiant, which is a Fireye company, found that in 2016 ...
Continue Reading

Former NSA Director Michael Hayden: "We have a Russia Problem"

I have been saying this here for the last few years, but if you get it confirmed by a former NSA director, that's nice to hear. The Wall Street Journal just reported that President Barack ...
Continue Reading

Russian Central Bank Loses 2 Billion Rubles in Cyberheist

Reuters reported that hackers stole more than 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank said on Friday. “We can’t say exactly when, ...
Continue Reading

The Top Five Names In Cybersecurity

Looking for the top names in cybersecurity? Look no further than the Cybersecurity 500 list of the world’s hottest and most innovative cybersecurity companies: ...
Continue Reading

10 Ways To Avoid Holiday Scams

With the biggest cybercriminal hacking holidays of the year upon us, it's time for a reminder of red flags to pay attention to when shopping either online or in brick-and-mortar stores.
Continue Reading

New Version of iSpy Trojan Steals Your Software Licenses

Earlier this year we posted about Jsocket, a highly malicious Trojan that we spotted being delivered through phishing emails shared with us via the Phish Alert Button (PAB). Although ...
Continue Reading

Coming Soon to an Inbox Near You: A New Type Of Tech Support Scam

By Eric Howes, KnowBe4 Principal Lab Researcher. Yesterday we spotted an unusual phishing email that we'd like to share with readers. If nothing else, it tells us that the increased ...
Continue Reading

Cyber Attack Maps...Accurate Or Just Eye Candy?

Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:
Continue Reading

14 Ways A Cyberheist Hits Your Bottom Line: Total Cost Of A Hack

What is the true cost of a data breach? After analyzing a health plan breach, research firm Deloitte says the toll of a cyberheist is significantly underestimated. The firm in a report ...
Continue Reading

Scam Of The Week: Orlando Nightclub Phishing Attacks

Just when you think they cannot sink any lower, criminal internet scum is now exploiting the tragedy in Orlando. Unfortunately, from this spot I have been warning about these lowlifes ...
Continue Reading

Looks Like 8 More Cyberheists By North Koreans

Gottfried Leibbrandt, chief executive of the world’s largest interbank funds-transfer system SWIFT, has said repeatedly that the prospect of cybercrime is what keeps him awake at night. ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews