cybercrime
Top phishing targets in 2016? Google, Yahoo, and Apple
For every new phishing URL impersonating a financial institution, there were more than seven impersonating technology companies. Comparison of most impersonated companies …
UK sports retailer Sports Direct hacked
UK’s largest sports retail outlet Sports Direct has suffered a data breach in September 2016, when an attacker gained access to its staff portal, and through it to …
AKBuilder: A builder for exploit-laden Word documents
One doesn’t have to be a great coder to become a successful cybercriminal, as underground markets are filled with offerings that automate one or another step of an …
Phishing trends: Who is targeted and why
The business model of phishing has evolved. The bad guys have found ways to multiply their profits at the expense of organizations they aren’t even attacking directly, …
Corporate insiders sell secrets and access on dark web
Dark web marketplaces have witnessed an increase of employees offering insider traders, fraudsters and hackers information, help or outright access to their company’s …
Identity fraud hits record high
The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. …
91% of phishing attacks are display name spoofs
GreatHorn analyzed more than 56 million emails from 91,500 corporate mailboxes from March to November 2016. The data found that display name spoofs are the clear phishing …
The emergence of new global cybercriminal attack patterns
The findings of a new Malwarebytes report illustrate a significant shift in cybercriminal attack and malware methodology from previous years. Ransomware, ad fraud and botnets, …
Why companies shouldn’t feel helpless in the fight against ransomware
According to recent reports, ransomware is now a billion dollar business for cybercriminals. Attackers are honing in on the weak spots of organisations; human behaviour …
Increasingly sophisticated attacks call for advanced protection tools
A new NTT Security report underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) …
Phishers’ new social engineering trick: PDF attachments with malicious links
It is – or it should be – a well known fact that attackers occasionally email potential victims with PDF attachments containing malware or exploit code. But the …
54% of Americans say existing cyber security laws aren’t getting the job done
As President Trump and the new Congress stake out a 2017 agenda, Americans want to see a pressing need to modernize laws dealing with the digital economy and stepped up …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring