news analysisAttackers add hacked servers to commercial proxy networks for profitProxyjacking allows attackers to sell unknowing victims' unused network bandwidth.By Lucian Constantin30 Jun 20234 minsCybercrime news Command-and-control framework PhonyC2 attributed to Iran’s Muddywater groupBy Apurva Venkat30 Jun 20234 minsAdvanced Persistent ThreatsCyberattacksVulnerabilitiesnews analysis Mission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat30 Jun 20234 minsRansomwareMalwareOpen Source news analysisNo consensus on creating a unified US cyber incident reporting frameworkBy Cynthia Brumfield 29 Jun 202310 minsRegulationRansomwareCompliance newsNew ransomware group starts to wreak havocBy Apurva Venkat 29 Jun 20234 minsRansomwareCyberattacks featureHow the new deepfake reality will impact cyber insuranceBy Deb Radcliff 29 Jun 20238 minsInsurance IndustryCybercrimeData and Information Security newsEncrochat bust leads to 6,500 arrests, seizure of $1B in assetsBy Apurva Venkat 28 Jun 20234 minsCommunications SecurityCybercrime newsAttack surface visibility a top CISO priority amid growing attacks: ReportBy Shweta Sharma 28 Jun 20234 minsCSO and CISOCyberattacks newsSEC notice to SolarWinds CISO and CFO roils cybersecurity industryBy Apurva Venkat 27 Jun 20235 minsCSO and CISOData BreachLegal Articlesnews analysisMicrosoft Office 365 AitM phishing reveals signs of much larger BEC campaignThis newly discovered, global campaign indicates growing popularity for multi-stage adversary-in-the-middle tactics among threat actors.By Lucian Constantin 14 Jun 2023 5 minsPhishingEmail SecurityCybercrimenews analysisBusiness email compromise scams take new dimension with multi-stage attacksA new attack group leverages trusted relationships between partner organizations to bypass multifactor authentication.By Lucian Constantin 12 Jun 2023 6 minsEmail SecurityCyberattacksCybercrimenews analysisClop extortion gang gives MOVEit exploit victims one week to reach outAt least 20 organizations have been compromised by Clop's MOVEit exploit, according to new research.By Lucian Constantin 07 Jun 2023 5 minsRansomwareCyberattacksCybercrimefeatureWhat is the Cybercrime Atlas? How it can help disrupt cybercrimeThe Cybercrime Atlas aims to map the cybercriminal ecosystem worldwide and allow global law enforcement agencies to access that information when fighting cybercrime. By Samira Sarraf 01 Jun 2023 6 minsCyberattacksCybercrimeopinionWhat cybersecurity professionals can learn from the humble antWhen ants work together to defend their colony, it’s all for one and one for all. This model could help forge an immediate global, coordinated, and effective response to cyberattacks.By Christopher Burgess 22 May 2023 5 minsCSO and CISOGovernmentCybercrimenewsRussian national indicted for ransomware attacks against the USMikhail Pavlovich Matveev is charged with conspiring to transmit ransom demands, conspiring to damage protected computers, and intentionally damaging protected computers.By Apurva Venkat 18 May 2023 4 minsRansomwareLegalCybercrimenews analysisNew ransomware gang RA Group quickly expanding operationsThe RA Group uses double extortion and has detailed information on its victims.By Lucian Constantin 15 May 2023 4 minsRansomwareCyberattacksCybercrimenews analysisLaw enforcement crackdowns and new techniques are forcing cybercriminals to pivotResearchers say that law enforcement crackdowns and new investigative tools are putting pressure on cybercriminals, but challenges for defenders remain.By Cynthia Brumfield 15 May 2023 7 minsRansomwareBlockchainCybercrimenews analysisIsraeli threat group uses fake company acquisitions in CEO fraud schemesThe group targets multinational firms using email display name spoofing and multiple fake personas.By Lucian Constantin 11 May 2023 6 minsEmail SecurityCybercrimenews analysisNew ransomware group CACTUS abuses remote management tools for persistenceThe CACTUS cybercriminal group targets VPN appliances for initial access and to install a backdoor.By Lucian Constantin 08 May 2023 4 minsRansomwareCybercrimenews analysisCybercrime group FIN7 targets Veeam backup serversAt least two Veeam instances have been compromised, possibly using a vulnerability patched in March.By Lucian Constantin 28 Apr 2023 4 minsCybercrimeVulnerabilitiesnews analysisHard-to-detect malware loader distributed via AI-generated YouTube videosThe new malware loads the Aurora infostealer and can avoid being executed in virtual machines or sandboxes for analysis.By Lucian Constantin 18 Apr 2023 4 minsMalwareCybercrime Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper 7 Common Ways Ransomware Can Infect Your Organisation By Sentinel One 31 Oct 2022CybercrimeRansomwareSecurity View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsPhishingEmail ClientsCybercrime An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsPhishingEmail ClientsCybercrime Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 PhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime