How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How much does a data breach cost? It isn’t a simple question, but the answer is the only way to transmit the urgency of the situation to C-level executives. The 2018 Cost of a Data Breach... Go on to the site to read the full article ... Read More
The Gaming Industry, a Privileged Target for Crooks — The Fortnite Case

The Gaming Industry, a Privileged Target for Crooks — The Fortnite Case

| | Hacking
Introduction In the past, we’ve reported many cases of cyberattacks against companies operating in the gaming industry. We observed many attacks, especially DDoSing, against the infrastructure... Go on to the site to read the full article ... Read More
Five Techniques to Bypass Office 365 Protections Used in Real Phishing Campaigns

Five Techniques to Bypass Office 365 Protections Used in Real Phishing Campaigns

| | Phishing
In the last couple of years, crooks devised several techniques to bypass anti-phishing filters, let’s analyze them to understand the way threat actors used them to bypass Office 365... Go on to the site to read the full article ... Read More
Mirai botnet evolution since its source code is available online

Mirai botnet evolution since its source code is available online

Mirai – The evolving IoT threat Since the release of the source code of the Mirai botnet, crooks have improved their own versions by implementing new functionalities and by adding new exploits. A... Go on to the site to read the full article ... Read More

The VPNFilter: A Powerful Botnet of More Than 500k Devices Ready to Attack

VPNFilter botnet – The discovery Security researchers at Talos group, along with colleagues from other cybersecurity firms and law enforcement agencies, have discovered a huge botnet composed... Go on to the site to read the full article ... Read More

GDPR Provides Scammers with a New Golden Opportunity

| | Phishing
GDPR latest: Fraudsters posing as banks in data protection emails phishing scam The EU General Data Protection Regulation (GDPR) has arrived, and crooks are ready to exploit the media attention on... Go on to the site to read the full article ... Read More

The Rowhammer – the evolution of a dangerous attack over the years

The Rowhammer attack Back in 2015, security researchers at Google’s Project Zero team demonstrated how to hijack an Intel-compatible PCs running Linux by exploiting the physical weaknesses in... Go on to the site to read the full article ... Read More

Hacking communities in the Deep Web

Introduction The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm’s length; meanwhile today they are... Go on to the site to read the full article ... Read More

The Most Common Social Engineering Attacks [Updated 2020]

| | Phishing
Introduction In his book, “The Art of Deception,” popular hacker Kevin Mitnick explained the power of social engineering techniques. Today, we are aware that social engineering can be combined with... Go on to the site to read the full article ... Read More
Crooks Exploit Facebook to Spread Crypto-miner Malware

Crooks Exploit Facebook to Spread Crypto-miner Malware

| | Phishing
Social networks are a privileged attack vector that could be used by cybercriminals to spread malware to a wide audience. In the last month’s security experts discovered many strains of malware... Go on to the site to read the full article ... Read More