Cybercriminals

There are concerns among security leaders about the threats bots pose, including site slowdowns caused by overwhelming traffic, new account fraud, credential cracking/brute force attacks, account...
May 11, 2021
11,500
0
Cybercriminals increasingly often use legitimate services such as Google Forms and Telegram to obtain user data stolen during phishing attacks, according to Group-IB. Alternative ways to obtain data...
Apr 08, 2021
6,414
0
Ransomware attacks have grown, with hacking now accounting for 30% of all attacks, and the healthcare industry is increasingly targeted by criminals. In particular, attackers have begun exploiting...
Jan 07, 2021
6,764
0
Criminal activity targeting the retail, travel, and hospitality sectors has ramped up with attacks of all types and sizes between July 2018 and June 2020, according to Akamai’s State of the Internet/...
Oct 30, 2020
3,627
0
Criminal businesses need hosting services and cybersecurity protections too, according to Trend Micro’s study. The study analyzes the market for underground hosting services and details how and where...
Jul 27, 2020
1,637
0
Criminal, political and nation-state threat actors have exploited the COVID-19 pandemic and related themes to target organizations across all sectors, including governments, industry, healthcare,...
Jul 23, 2020
3,035
0
Trust has eroded among criminal interactions, causing a switch to e-commerce platforms and communication using Discord, which both increase user anonymization, according to Trend Micro’s new data on...
May 27, 2020
2,534
1
Paying cybercriminals to restore data encrypted during a ransomware attack is not an easy and inexpensive path to recovery. In fact, the total cost of recovery almost doubles when organizations pay a...
May 13, 2020
2,508
1
More than 64% of respondents reported suffering at least one successful attack within the last year, and 59% believe a lack of network visibility poses a high or very high risk to their operations,...
Apr 22, 2020
5,917
2
In a brand phishing attack, criminals try to imitate the official website of a well-known brand by using a similar domain name or URL and web-page design to the genuine site.  The link to the fake...
Apr 15, 2020
10,752
6
Ransomware attacks skyrocketed in 2019, according to the latest Beazley Breach Briefing, an annual update on cyber trends produced by leading cyber insurer Beazley. Beazley’s in-house team of breach...
Apr 03, 2020
8,885
5
The need for bot management is fueled by the rise in automated attacks. In the early days, the use of bots was limited to small scraping attempts or spamming. Today, things are vastly different. Bots...
Apr 03, 2020
9,478
4
From May 2019 and continuing on until the end of the year, there was a dramatic shift by criminals who started targeting APIs, in an effort to bypass security controls, according to Akamai’s 2020...
Feb 20, 2020
6,965
2
Cybercriminals are using more and more evasive tactics to target businesses and consumers, according to SonicWall’s 2020 Cyber Threat Report. “Cybercriminals are honing their ability to design,...
Feb 06, 2020
6,824
1
Cybercriminals from around the world are actively discussing how to compromise connected devices, and how to leverage these devices for moneymaking schemes, according to Trend Micro’s research,...
Sep 23, 2019
7,294
1
Annual losses from cyberattacks averaged USD 4.7 million in the last fiscal year—with more than one in 10 firms losing over USD 10 million — according to a new report from The Cybersecurity...
Sep 05, 2019
5,807
0
Cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they become more sophisticated in...
Aug 20, 2019
16,110
4
Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations improve in areas such as...
Apr 26, 2019
7,738
0
Cybercriminals are constantly evolving the sophistication of their attacks—from continuing to exploit the vast insecurity of IoT devices, to morphing open source malware tools into new threats,...
Mar 05, 2019
12,325
3