Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

CyberheistNews Vol 4, # 06 Cryptolocker Scrambles Files Of US Law Firm

CyberheistNews Vol 4, # 06
Continue Reading

Why Cybercrime Pays Off

Continue Reading

CyberheistNews Vol 4, # 05

CyberheistNews Vol 4, # 05
Continue Reading

FBI: The 10 Criminal Cyber Crime Professions

The Center for Cyber Forensics and Information Security (CCFIS) reported in a blog: "The FBI has recently classified the different 'professional positions' they have encountered in the ...
Continue Reading

What Is The Deep Web 101

Pierluigi Paganini wrote a great blog post today. The Deep Web (or Invisible Web) is all the information on the World Wide Web not reported by normal search engines. It's HUGE. According ...
Continue Reading

Firm Bankrupted by Cyberheist Sues Bank

Continue Reading

Eastern European Hackers Hit Target Phish Out 40M Credit Cards

During the Black Friday shopping week, tens of millions of credit and debit card records were "phished" out of Target. The data breach was nationwide, and has extended for as far as ...
Continue Reading

The Antivirus Industry’s Dirty Little Secret

[Updated 5/1/2016]. The Antivirus industry has a dirty little secret that they really don’t want anyone to know. Despite the claims of their marketing departments, their products are not ...
Continue Reading

Inside The Adobe Databreach Disaster

Last week Adobe announced probably the worst news ever for a tech company. Both their source code and customer lists had been stolen. EPIC FAIL!
Continue Reading

CyberheistNews Vol 3, # 40

CyberheistNews Vol 3, # 40
Continue Reading

FBI: “Beta Bot” malware kills your anti-virus and steals data

This week, the FBI sent out a warning that a strain of malware known as "Beta Bot" can turn off your antivirus, stops access to the websites of antivirus vendors so that your antivirus ...
Continue Reading

Scam Of The Week: Ransomware Uses Child Porn Threat

Getting caught viewing child porn is a huge deal and instantly makes you an outcast in most western countries. Cybercriminals have cooked up a new way to blackmail people out of their ...
Continue Reading

Cybercrime Automates Fake ID's For Spear-phishing

Today it was reported through several sources that a new Cybercrime-as-a-Service option is available: creation of fake scanned passports, ID cards, driver's licenses and fake scanned ...
Continue Reading

Electronic ID cards join fight against phishing attacks

Phishing attacks are believed to have hit 37.3 million people last year, escalating online password theft 300%. To fight back against this type of cyberattack, a team of researchers at ...
Continue Reading

New Cybercrime-as-a-Service: Unethical Pen-testing

I have talked about this a few times before, there is a well-developed $3 Billion underground economy specialized in cybercrime. Here is an example of a "promising" new criminal DIY ...
Continue Reading

Cyber risk weighs heavy on minds of execs

Tony Bradley at CSO Mag has a good analysis: " There is good news and bad new stemming from the Lloyd’s of London Risk Index 2013 report. The good news is that cyber risk is gaining more ...
Continue Reading

Hackers put a bull's-eye on small business

Less than 500 employees? You’ve got a 20 percent chance of being hacked, and if it happens there’s a good chance your business is finished.
Continue Reading

Scam Of The Week: "Held For Ransom"

You should alert your users that a particularly effective scam is growing by leaps and bounds recently. It's not new, but it's bursting into mainline cybercrime these last few weeks. The ...
Continue Reading

LLoyds: Cyber Risk Rises from 12th to 3rd place In Three Years

You all know the world famous insurance company LLoyds. What you may not know is that they maintain a list of Top Risks. It's called their Risk Index and it's the result of a survey of ...
Continue Reading

Five Ways Your Employees Can Kill Your Company

One - Insider Threat: Stealing valuable information for either profit or idealistic motives. Examples: Software developers taking home code for their next job, sales people downloading ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews