The Hackers Smell Blood Now, Not Silicon
Steve Morgan wrote an excellent post with the Top 5 cybersecurity facts, figures and statistics for 2017 at the CSO site. These predictions and observations provide a 30,000-foot view of ...
We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.
Steve Morgan wrote an excellent post with the Top 5 cybersecurity facts, figures and statistics for 2017 at the CSO site. These predictions and observations provide a 30,000-foot view of ...
There is a rising trend of cybercrime sites for wannabe "crims" that make malicious hacking a point-and-click exercise. A new report describes two more sites that were discovered by ...
Yesterday morning, after monitoring this new outbreak for 24 hours, I came to the conclusion we were dealing with cyber warfare , and not ransomware . Two separate reports coming from ...
OK, after 24 hours of monitoring this new Petya ransomworm outbreak, I am calling it. This has been brewing under the surface for a few years, but now we are dealing with open cyber ...
The WSJ just posted a very interesting article by Nathan Hodge confirming what we have been saying here for the last few years. Russian President Vladimir Putin suggested in St Petersburg ...
The mysterious Shadow Brokers – the hackers who leaked the NSA SMB zero-day exploit that powered WanaCry into the world's worst ransomworm – are back, and could cause even more damage. In ...
The National Institute of Standards and Technology (NIST) has issued a draft update (PDF) to the Framework for Improving Critical Infrastructure Cybersecurity—also known as the ...
Check Point Software blogged about Chinese hackers who have taken smishing to the next level, using a rogue cell phone tower to distribute Android banking malware via spoofed SMS messages.
It was all over the press. Initially reported by Bleepingcomputer and picked up by sites like Endgadget, they all went gaga over a new technique that allows the bad guys to take over your ...
There was some good news reported in Mandiant's M-Trends 2017 report, but this was heavily outweighed by a lot of very bad news. Mandiant, which is a Fireye company, found that in 2016 ...
I have been saying this here for the last few years, but if you get it confirmed by a former NSA director, that's nice to hear. The Wall Street Journal just reported that President Barack ...
Reuters reported that hackers stole more than 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank said on Friday. “We can’t say exactly when, ...
Looking for the top names in cybersecurity? Look no further than the Cybersecurity 500 list of the world’s hottest and most innovative cybersecurity companies: ...
With the biggest cybercriminal hacking holidays of the year upon us, it's time for a reminder of red flags to pay attention to when shopping either online or in brick-and-mortar stores.
Earlier this year we posted about Jsocket, a highly malicious Trojan that we spotted being delivered through phishing emails shared with us via the Phish Alert Button (PAB). Although ...
By Eric Howes, KnowBe4 Principal Lab Researcher. Yesterday we spotted an unusual phishing email that we'd like to share with readers. If nothing else, it tells us that the increased ...
Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:
What is the true cost of a data breach? After analyzing a health plan breach, research firm Deloitte says the toll of a cyberheist is significantly underestimated. The firm in a report ...
Just when you think they cannot sink any lower, criminal internet scum is now exploiting the tragedy in Orlando. Unfortunately, from this spot I have been warning about these lowlifes ...
Gottfried Leibbrandt, chief executive of the world’s largest interbank funds-transfer system SWIFT, has said repeatedly that the prospect of cybercrime is what keeps him awake at night. ...