How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study
How much does a data breach cost? It isn’t a simple question, but the answer is the only way to transmit the urgency of the situation to C-level executives. The 2018 Cost of a Data Breach... Go on to the site to read the full article ... Read More
The Gaming Industry, a Privileged Target for Crooks — The Fortnite Case
Introduction In the past, we’ve reported many cases of cyberattacks against companies operating in the gaming industry. We observed many attacks, especially DDoSing, against the infrastructure... Go on to the site to read the full article ... Read More
Five Techniques to Bypass Office 365 Protections Used in Real Phishing Campaigns
In the last couple of years, crooks devised several techniques to bypass anti-phishing filters, let’s analyze them to understand the way threat actors used them to bypass Office 365... Go on to the site to read the full article ... Read More
Mirai botnet evolution since its source code is available online
Mirai – The evolving IoT threat Since the release of the source code of the Mirai botnet, crooks have improved their own versions by implementing new functionalities and by adding new exploits. A... Go on to the site to read the full article ... Read More
The VPNFilter: A Powerful Botnet of More Than 500k Devices Ready to Attack
VPNFilter botnet – The discovery Security researchers at Talos group, along with colleagues from other cybersecurity firms and law enforcement agencies, have discovered a huge botnet composed... Go on to the site to read the full article ... Read More
GDPR Provides Scammers with a New Golden Opportunity
GDPR latest: Fraudsters posing as banks in data protection emails phishing scam The EU General Data Protection Regulation (GDPR) has arrived, and crooks are ready to exploit the media attention on... Go on to the site to read the full article ... Read More
The Rowhammer – the evolution of a dangerous attack over the years
The Rowhammer attack Back in 2015, security researchers at Google’s Project Zero team demonstrated how to hijack an Intel-compatible PCs running Linux by exploiting the physical weaknesses in... Go on to the site to read the full article ... Read More
Hacking communities in the Deep Web
Introduction The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm’s length; meanwhile today they are... Go on to the site to read the full article ... Read More
The Most Common Social Engineering Attacks [Updated 2020]
Introduction In his book, “The Art of Deception,” popular hacker Kevin Mitnick explained the power of social engineering techniques. Today, we are aware that social engineering can be combined with... Go on to the site to read the full article ... Read More
Crooks Exploit Facebook to Spread Crypto-miner Malware
Social networks are a privileged attack vector that could be used by cybercriminals to spread malware to a wide audience. In the last month’s security experts discovered many strains of malware... Go on to the site to read the full article ... Read More