OSINT: Mapping Threat Actor Social Media Accounts

OSINT: Mapping Threat Actor Social Media Accounts

| | OSINT
A threatening social media post targeting an executive, employee, brand, or any other asset often has merit to it, and investigating the online accounts associated with the threat actor is imperative in the process of assessing risk. By mapping social media accounts operated by the threat actor, you can build ... Read More
Look-alike Domain Mitigation: Breaking Down the Steps

Look-alike Domain Mitigation: Breaking Down the Steps

|
Look-alike domains remain some of the most consistent elements of cyber attacks targeting organizations. At a high-level, there are two ways to mitigate the threat of a look-alike domain: remove the threat completely by taking it offline, or block attacks on your users by implementing IT security controls. If we ... Read More
The Year In Review: How COVID-19 Has Changed Cyber Security

The Year In Review: How COVID-19 Has Changed Cyber Security

| | COVID-19
The novel coronavirus has dominated 2020, and in the cyber community, threat actors have capitalized on its impact from the beginning. In early March we saw the first of what would be an onslaught of criminal activity using the pandemic to manipulate users, and over the course of the year ... Read More
Top 7 Use Cases for Digital Risk Protection

Top 7 Use Cases for Digital Risk Protection

| | Digital Risk Protection, DRP
Today’s enterprises are experiencing an accelerated digital transformation due to the pandemic, and adoption of initiatives that would normally span years are being fast-tracked to support remote workforces and transition to new platforms. The external digital landscape is also rapidly expanding, and organizations are being required to conduct business more ... Read More
Encryption to Double Extortion: Ransomware's Rapid Evolution

Encryption to Double Extortion: Ransomware’s Rapid Evolution

| | Ransomware, Ryuk, TrickBot
Threat actors are leveraging stolen data to enhance ransomware attacks. Data leaks and ransomware - once considered two distinct threats - are overlapping into a hybrid tactic known as double extortion. While traditional ransomware attacks deny access to valuable systems and data, double extortion threatens to leak sensitive data if ... Read More
Limited Impact of Phishing Site Blocklists and Browser Warnings

Limited Impact of Phishing Site Blocklists and Browser Warnings

The life of a phishing site is brief, but impactful. A study published earlier this year found the average time span between the first and last victim of a phishing attack is just 21 hours.  The same study observed the average phishing site shows up in industry blocklist feeds nearly ... Read More
$2.3M Stolen from Wisconsin GOP via BEC Attack

$2.3M Stolen from Wisconsin GOP via BEC Attack

  With Election Day just around the corner, the Republican Party of Wisconsin  revealed that $2.3M was recently stolen from election funds intended to support the re-election of President Trump.  According to their statement, they are victims of a Business Email Compromise phishing attack that altered invoices to direct payments ... Read More
Ryuk Ransomware Targeting Healthcare

Ryuk Ransomware Targeting Healthcare

|
As if the COVID-19 pandemic were not enough, the healthcare sector is now being actively targeted by threat actors using Ryuk ransomware. Yesterday, the FBI issued an increased and imminent cyber threat warning amid growing reports of healthcare providers falling victim to the campaign. The threat actors are using Trickbot ... Read More
Planetary Reef: Cybercriminal Hosting and Phishing-as-a-Service Threat Actor

Planetary Reef: Cybercriminal Hosting and Phishing-as-a-Service Threat Actor

| | domains
PhishLabs is monitoring a threat actor group that has set up fraudulent hosting companies with leased IP space from a legitimate reseller. They are using this infrastructure for bulletproof hosting services as well as to carry out their own phishing attacks. The group, which is based in Indonesia, has been ... Read More
Loading...