Like online shoppers prefer big sale days to grab deals, cybercriminals prey on e-commerce sites to trick unwitting shoppers. E-commerce websites are often a primary target for scams like web skimming or e-skimming from Magecart attackers. As we’re in...
The growth of data and the increasing complexity of extracting intelligence from information have led businesses and governments across the globe to implement artificial intelligence and machine learning technologies. AI and ML applications to supplant and enhance human capabilities...
While security admins struggle to address the significant risks from unpatched vulnerabilities, adversaries are becoming more advanced and finding new ways to exploit security flaws. Cybercriminal groups usually search for unpatched vulnerabilities to exploit and compromise the targeted devices....
Emotet, a banking-trojan-turned-botnet that primarily spread via emails, has raised its head after a hiatus of 10 months. Emotet made headlines when Europol announced that eight global law enforcement authorities disrupted it under "Operation Ladybird."
Abuse.ch released a list of...
Adversaries constantly look for new techniques to make their phishing attacks more effective; bait attacks are one of those techniques. Most phishers leverage bait attacks to estimate which victim is willing to respond to their phishing scams. The latest report from...
In the first half of 2021, cyber adversaries pried on opportunities to attack enterprise infrastructure and critical industries. Even the slightest security mismanagement motivated them to disrupt operations and exfiltrate data. As the year draws to a close, and...
In the movie Die Hard 4.0, John McClane and a young hacker team up to thwart the plans of cyber-terrorist Thomas Gabriel in Washington D.C. Gabriel’s plan is known as "fire sale" which is a coordinated attack on the...
Cybersecurity researchers at AT&T Labs uncovered a new malware variant targeting routers and IoT devices. Tracked as BotenaGo, the malware is leveraging over 30 exploit methods to compromise the targeted devices, exposing millions of IoT devices and routers to...
With the prevalence of hacker intrusions, the consequences of not addressing the vulnerabilities and other security loopholes in your network systems could be severe. Adversaries often target unpatched vulnerabilities to compromise targeted systems, and one of their most common...
The evolution of new malware variants has become prevalent in the cyberthreat landscape. Cybercriminals continue to create novel malicious codes, botnets, or redesign old malware variants to compromise the targeted networks without getting caught. Cybersecurity solutions provider Check Point...