Tag "Cyber Criminals"

Back to homepage
Expert Articles

How to Stay Protected Against Cyberattacks

By Chris Usatenko – EveryCloud, It seems like not a day passes by that we hear about a huge data breach, affecting millions, or even billions of users and costing

Software

HOW STRONG IS YOUR ANTI-PHISHING STRATEGY?

Phishing attacks are one of the most common forms of security challenges at both individual and organizational levels. Under such attacks, cybercriminals try to gain unauthorized access to legit login

Artificial Intelligence IT Compliance

Key Challenges Impacting IT Audit Pros Navigating An Evolving Risk Landscape

Protiviti and ISACA surveyed 2,252 chief audit executives (CAEs), internal audit professionals and IT audit vice presidents and directors worldwide. Click here to view original webpage at www.helpnetsecurity.com

Software

Cybercrime Tool Prices Bump Up in Dark Web Markets

Prices have been rising in the last two years for longstanding tools available on the Dark Web to help bad actors commit cyber attacks and fraud, alongside newer innovations that

Software Vendor News

Ransomware hits Pitney Bowes systems

Mailing and ecommerce services company Pitney Bowes has confirmed some of its systems have been affected by a ransomware outbreak but says that there is no evidence customer data has

Software

GandCrab cousin Sodinokibi made a fortune for ransomware pushers

By tracking down bitcoin wallets, researchers estimate that the Sodinokibi creators pocketed at least $4.5 million. Security researchers have tracked the bitcoin payments made by victims of the Sodinokibi ransomware

Software

Email scam attacks against healthcare targets see huge rise

Proofpoint finds a 300 per cent increase in such attacks this year. Healthcare has always been an industry of interest for cybercriminals, but a new Proofpoint report argues that the

Software

Cybercrime is maturing, shifting its focus to larger and more profitable targets

Cybercrime is continuing to mature and becoming more and more bold, shifting its focus to larger and more profitable targets as well as new technologies. Data is the key element

Identity Theft

Unmask cybercriminals through identity attribution

Organized crime has grown more complex since the turn of the century—coinciding with the rise of the digital world, cybercriminals have leveraged the proliferation of technology to broaden their reach with a

Hardware/Network

The 5 biggest examples of executive threats and how to prevent them

Many executives focus their security efforts and budgets solely on physical threats, but attacks targeting an executive’s digital presence can be just as dangerous. Criminals are looking to exploit the