If a crook is already inside your email, occasionally adding in believable emails of their own... how on earth do you spot the fake ones?
Read moreBusiness Email Compromise (BEC) Criminal Ring
July 10 2020A criminal group called Cosmic Lynx seems to be based in Russia: Dubbed Cosmic Lynx, the group has carried out more than 200 BEC campaigns since July 2019, according...
Read moreThe Unintended Harms of Cybersecurity
June 26 2020Interesting research: "Identifying Unintended Harms of Cybersecurity Countermeasures": Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks to their services or systems. In some...
Read moreSextortion again - but with "we hacked your website and stole all your data" instead of "we hacked your webcam and made a video".
Read moreRansomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT
February 24 2020Since at least 2017, there has been a significant increase in public disclosures of ransomware incidents impacting industrial production and critical infrastructure organizations. Well-known ransomware families...
Read moreRansomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT
February 24 2020Since at least 2017, there has been a significant increase in public disclosures of ransomware incidents impacting industrial production and critical infrastructure organizations. Well-known ransomware families...
Read moreRansomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT
February 24 2020Since at least 2017, there has been a significant increase in public disclosures of ransomware incidents impacting industrial production and critical infrastructure organizations. Well-known ransomware families...
Read moreRansomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT
February 24 2020Since at least 2017, there has been a significant increase in public disclosures of ransomware incidents impacting industrial production and critical infrastructure organizations. Well-known ransomware families...
Read moreSAIGON, the Mysterious Ursnif Fork
January 9 2020Ursnif (aka Gozi/Gozi-ISFB) is one of the oldest banking malware families still in active distribution. While the first major version of Ursnif was identified in 2006, several...
Read moreLocky is Back Asking for Unpaid Debts
June 24 2016On June 21, 2016, FireEye’s Dynamic Threat Intelligence (DTI) identified an increase in JavaScript contained within spam emails. FireEye analysts determined the increase was the result of...
Read more
Recent Comments