Human Risk Management Blog

Cybercrime

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

Ransomware hits admin workstation and kills 7 servers

I wanted to share a horror story with you, something that happened to somebody the day before yesterday. This is what happened in their own words:

Why All This Russian Cybercrime in Five Minutes

We all know that a large amount of cybercrime originates in Russia and other eastern European countries that were former USSR states. But why is that? I decided to dig into this and did ...

Poll: Employees Clueless About Social Engineering

Fresh from Dark reading: "When it comes to social engineering, Pogo, the central character of a long-running American comic strip, said it best. "We have met the enemy and he is us."

Who Is The Most Dangerous Cyber Celebrity of 2014?

No, it's not who you think. In recent year it was always a female celebrity like Emma Watson, Heidi Klum or Cameron Diaz that lured web surfers to sites laced with malware. At the end of ...

Latest Anti Phishing Working Group Report

The latest APWG report came out: "Phishers are criminal, but they do make rational decisions about how to go about their work. They’re in it for the money, and they work to make their ...

Home Depot Hack Turns Into Criminal Negligence Scandal

Wait for the class-actions lawsuits to get unleashed. The lawyers are going to be over this one like white on rice. Ex-employees from the Home Depot IT technology group are now claiming ...

Home Depot Hit By Same Russian Hackers As Target

Right after the Target Hack, C-level execs at Home Depot Inc. put together a task force to prevent being the victim of a similar attack. The task force recommended to fully encrypt ...

We Are At War In The Digital World

I just read an opinion editorial in the Wall Street Journal that really did clarify the new threat we are faced with this last decade. "Ten years ago, the 9/11 Commission Report triggered ...

Cyber Criminals Use AEA-256 Crypto To Obfuscate Phishing Sites

The Register said: "Well, at least someone listened to Snowden about privacy... Phishing fraudsters have begun using industry-standard AES-256 encryption to disguise the content of ...

New Ransomware Discovered Called CryptoGraphic Locker

Panda researcher BartBlaze discovered a new strain of ransomware called CryptoGraphic Locker. Bleepingcomputer wrote: "Just like other encrypting ransomware, this infection will scan your ...

Is The Home Depot Hack Really Russian Retaliation?

Brian Krebs blogged: "Multiple banks say they are seeing evidence that Home Depot stores may be the source of a massive new batch of stolen credit and debit cards that went on sale this ...

Scam Of The Week: Jennifer Lawrence Nude Pictures Phishing

There is a new (true) Current Event which unfortunately is the ultimate click bait. A hacker got into the Apple iCloud and hacked the account of Jennifer Lawrence and many other celebs.

J.P. Morgan Hacked Because Malware Infects Employee PC

This morning, the Wall Street Journal reported on the front page that J.P. Morgan was hacked and suffered a cyberheist called "a significant breach of corporate computer security".

A cybersecurity video you should really watch

Cybersecurity as Realpolitik by Dan Geer at Black Hat USA 2014

Workers At U.S. Nuclear Regulator Fooled By Phishing

Antone Gonsalves at CSO reported something that worries me, and this SHOULD NOT BE at this day and age.

Cryptolocker Being Spread On YouTube Ads

VirusBulletin reported that cyber criminals now spread around Cryptolocker / CryptoWall via YouTube. The cyber criminals purchase advertising space and use exploit kits to infect ...

Reveton Ransomware Adds Powerful Password Stealer

The Avast Blog reports a new "password stealer" feature in the Reveton ransomware. Reveton is the type of "police" lock/screen ransomware which falsely alerts users they've broken some ...

KnowBe4's Email Exposure Check Discovers Data Breach

You are probably aware of the free one-time Email Exposure Check Pro (EEC Pro) we can run for you. We find all the email addresses of your domain that are out there available on the ...

Phishing: 4.5 million Community Health patients records stolen

n">(Reuters) - Community Health Systems Inc, one of the biggest U.S. hospital groups, said it was the victim of a cyber attack that originated in China, resulting in the theft of ...

NSA's Monstermind Aims To Detect And Stop Cyber Attacks Instantly

WIRED magazine had the scoop, by directly talking to Edward Snowden recently. An NSA program known as MonsterMind, currently under development, is being designed to detect and stop cyber ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.