extortion
Sextortion Scams – How They Persuade and What to Watch for
Extortion, and especially “sextortion” emails, are becoming more frequent, and they can be extremely alarming when received. Such emails work by using threats to extort money, evoking intense fear. This type of ...
EA’s Source: It’s in the Game (and in Hackers’ Hands)
Richi Jennings | | EA, Electronic Arts, extortion, perhaps the hackers might be able to improve the game and send back some patch diffs, Ransomware, SB Blogwatch
Electronic Arts got hacked, and its source code stolen. Hackers took hundreds of gigabytes of game source code and tools ...
Security Boulevard
Facebook, Instagram, TikTok and Twitter Target Resellers of Hacked Accounts
BrianKrebs | | @H4CK, Beam, extortion, facebook, Instagram, Ne'er-Do-Well News, Noah Hawkins, ogusers, Ryan Zanelli, sextortion, SIM swapping, swatting, The Coming Storm, TikTok, trusted, Twitter, Web Fraud 2.0
Facebook, Instagram, TikTok, and Twitter this week all took steps to crack down on users involved in trafficking hijacked user accounts across their platforms. The coordinated action seized hundreds of accounts the ...
PART I: Retrospective 2020: DDoS Was Back — Bigger and Badder Than Ever Before
Never before has the risk of a distributed denial-of-service (DDoS) attack been higher. In 2020, we saw record-breaking attacks, a DDoS extortion campaign impacting thousands of organizations globally, more emergency customer turnups, ...
Pay2Key Ransomware Joins the Threat Landscape
As we approach the end of a year that has been trying for so many reasons, yet another ransomware has been seen in the wild targeting corporations—in particular, Israeli companies. A report ...
Security Boulevard
Don’t Let DDoS Extortionists Deliver a KO Punch
Since mid-August, a variety of threat actors (and copycats alike) have been targeting organizations across all industries globally, threatening impending DDoS attacks unless Bitcoin is paid out. It's apparent, as the campaign ...
Balancing Protection with Performance to Double Down on DDoS
Susan McReynolds | | cloud computing, Cloud Security, Connected Devices, ddos, edge computing, extortion, Financial Services, healthcare, Hybrid WAN, hybridcloud, Online Gaming, Public Sector, Retail & Commerce, Standards and Protocols
Combating DDoS attacks with the highest quality of mitigation means having the right platform, processes, and people in place. At Akamai, we're recognized as a leader for DDoS mitigation solutions based on ...
Former Medical Transcriptionist Accused of Trying to Extort Toronto Hospital Using Stolen Patient Data
Alina Bizga | | Data breach, Digital Privacy, extortion, Industry News, medical data, St. Michael’s Hospital, Unity Health Toronto
Personal information of roughly 150 patients of Toronto-based St. Michael’s Hospital has been stolen in a data breach, allegedly by a former third-party employee accused of taking them while on duty. According ...
Incident Response: Pay a Ransom, Go to Jail
Companies that find their files, data or networks locked by a malicious actor demanding an extortion payment now have a new worry in their incident response: The U.S. Department of Treasury. On ...
Security Boulevard
Extortionists Preying on Site Owners with Fake Website Hacking Scam
Researchers found that extortionists are targeting website owners with a scam in which they claim to have hacked their site and extracted a database. WebARX observed that the ploy first makes itself ...