Attacks

  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…

4 years ago
  • Attacks

Critical Infrastructure Ransomware Attacks Escalate

Reading Time: 4 minsThe Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for…

5 years ago
  • Attacks

Lessons from (Another) Florida Ransomware Attack

Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware…

5 years ago
  • Attacks

Supply Chain Risk: After the SolarWinds Incident

Reading Time: 3 minsSupply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you can…

5 years ago
  • Attacks

SolarWinds Hack: Immediate Action Items

Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious…

5 years ago
  • Attacks

Prevent Ransomware by Avoiding These 5 Mistakes

Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes…

5 years ago
  • Attacks

Malware Delivery as a Service

Reading Time: 4 minsMalware Delivery as a Service is a specialized service designed to meet ransomware's demand for access to…

6 years ago
  • Attacks

When Compromised Infrastructure Has Catastrophic Consequences

Reading Time: 5 minsFinancial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.

6 years ago
  • Attacks

Capital One Breach Demands New Approach to Cybersecurity

Reading Time: 3 minsIn one of the largest data breaches ever, Capital One admitted recently that more than 100 million…

7 years ago
  • Attacks

The Unacceptable Time Gap Between a Breach and Its Detection

Reading Time: 3 minsA recent report from NUIX stated that an attacker only needs 15 hours on average to breach…

7 years ago