news analysisAttackers add hacked servers to commercial proxy networks for profitProxyjacking allows attackers to sell unknowing victims' unused network bandwidth.By Lucian Constantin30 Jun 20234 minsCybercrime news Command-and-control framework PhonyC2 attributed to Iran’s Muddywater groupBy Apurva Venkat30 Jun 20234 minsAdvanced Persistent ThreatsCyberattacksVulnerabilitiesnews First state-sponsored cyberattack against UK government revealed two decades laterBy Michael Hill30 Jun 20233 minsCyberattacksGovernment news analysisMission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat 30 Jun 20234 minsRansomwareMalwareOpen Source newsNHS data reportedly compromised in University of Manchester cyberattackBy Michael Hill 30 Jun 20234 minsData BreachCyberattacks news analysisNo consensus on creating a unified US cyber incident reporting frameworkBy Cynthia Brumfield 29 Jun 202310 minsRegulationRansomwareCompliance newsNew ransomware group starts to wreak havocBy Apurva Venkat 29 Jun 20234 minsRansomwareCyberattacks featureHow the new deepfake reality will impact cyber insuranceBy Deb Radcliff 29 Jun 20238 minsInsurance IndustryCybercrimeData and Information Security newsEncrochat bust leads to 6,500 arrests, seizure of $1B in assetsBy Apurva Venkat 28 Jun 20234 minsCommunications SecurityCybercrime Articlesnews analysisMicrosoft Office 365 AitM phishing reveals signs of much larger BEC campaignThis newly discovered, global campaign indicates growing popularity for multi-stage adversary-in-the-middle tactics among threat actors.By Lucian Constantin 14 Jun 2023 5 minsPhishingEmail SecurityCybercrimenews analysisBusiness email compromise scams take new dimension with multi-stage attacksA new attack group leverages trusted relationships between partner organizations to bypass multifactor authentication.By Lucian Constantin 12 Jun 2023 6 minsEmail SecurityCyberattacksCybercrimenews analysisClop extortion gang gives MOVEit exploit victims one week to reach outAt least 20 organizations have been compromised by Clop's MOVEit exploit, according to new research.By Lucian Constantin 07 Jun 2023 5 minsRansomwareCyberattacksCybercrimefeatureWhat is the Cybercrime Atlas? How it can help disrupt cybercrimeThe Cybercrime Atlas aims to map the cybercriminal ecosystem worldwide and allow global law enforcement agencies to access that information when fighting cybercrime. By Samira Sarraf 01 Jun 2023 6 minsCyberattacksCybercrimeopinionWhat cybersecurity professionals can learn from the humble antWhen ants work together to defend their colony, it’s all for one and one for all. This model could help forge an immediate global, coordinated, and effective response to cyberattacks.By Christopher Burgess 22 May 2023 5 minsCSO and CISOGovernmentCybercrimebrandpostSponsored by NTTCyberattacks: How to strengthen your security, fastBy Sean Duffy, Vice President: Go-to-Market Cybersecurity at NTT 19 May 2023 5 minsCyberattacksCybercrimenewsRussian national indicted for ransomware attacks against the USMikhail Pavlovich Matveev is charged with conspiring to transmit ransom demands, conspiring to damage protected computers, and intentionally damaging protected computers.By Apurva Venkat 18 May 2023 4 minsRansomwareLegalCybercrimenews analysisNew ransomware gang RA Group quickly expanding operationsThe RA Group uses double extortion and has detailed information on its victims.By Lucian Constantin 15 May 2023 4 minsRansomwareCyberattacksCybercrimenews analysisLaw enforcement crackdowns and new techniques are forcing cybercriminals to pivotResearchers say that law enforcement crackdowns and new investigative tools are putting pressure on cybercriminals, but challenges for defenders remain.By Cynthia Brumfield 15 May 2023 7 minsRansomwareBlockchainCybercrimenews analysisIsraeli threat group uses fake company acquisitions in CEO fraud schemesThe group targets multinational firms using email display name spoofing and multiple fake personas.By Lucian Constantin 11 May 2023 6 minsEmail SecurityCybercrimenews analysisNew ransomware group CACTUS abuses remote management tools for persistenceThe CACTUS cybercriminal group targets VPN appliances for initial access and to install a backdoor.By Lucian Constantin 08 May 2023 4 minsRansomwareCybercrimenewsFCA urges Capita clients to investigate data breach for signs of compromiseUK financial regulatory body advises businesses to be fully engaged in understanding the extent of any data exposure.By Michael Hill 04 May 2023 2 minsRansomwareCybercrime Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsPhishingEmail ClientsCybercrime An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsPhishingEmail ClientsCybercrime Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 PhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime