Search Results for: credit card Blog Post Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Blog Post Do you know the Debit Card Is The Least Secure Way To Pay? January 4, 2020 According to the Federal Reserves’ 2019 Federal Reserve Payments Study, the total card payments in 2018 had 131.2 billion transactions... Blog Post McMenamins Suffered a Conti Ransomware Attack February 2, 2022 In mid-December 2021, pub and hotel chain McMenamins suffered a Conti ransomware attack that disrupted several of its computer systems.... Blog Post Magecart Hackers Now Hide PHP-Based Backdoor in Website Favicons June 7, 2021 Recently, security researchers have observed criminal activity in the realm of the cyber world by a cybercriminal group named Magecart... Blog Post 26M Stolen Cards are Rescued by Hacker October 16, 2019 Recently, BriansClub, one of the largest online marketplaces known for selling stolen card data, has been hacked. This data breach... Blog Post Cornerstone Payment Systems Leaked 6.7M Records February 3, 2020 Recently, Cornerstone payment processing company was found failing to protect its database containing credit card transactions. The Cornerstone Payment System... Blog Post Student Faces 20 Years in Prison for Pandemic Puppy Scam January 18, 2022 While the pandemic might have brought the rest of the world to a standstill, cybercriminals and threat actors thrived. As... Blog Post Over 40 Million T-Mobile Customers’ Data Stolen September 15, 2021 Over the weekend in mid-August, a supposed hacker bragged in online forums about having successfully carried out a data breach... Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding... Blog Post Hacker-For-Hire Continues To Exploit Entities Around The Globe January 11, 2022 Information about a well-known hacker-for-hire company that continues to exploit entities was released recently. Since its commencement in 2015, the... Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... Blog Post Cross Section of the Conti Ransomware Attack and its TTPs May 10, 2021 The first mention of Conti ransomware is from May 2020. It is characterized by its rapid spread to systems and... Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Blog Post Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone...
Blog Post Do you know the Debit Card Is The Least Secure Way To Pay? January 4, 2020 According to the Federal Reserves’ 2019 Federal Reserve Payments Study, the total card payments in 2018 had 131.2 billion transactions...
Blog Post McMenamins Suffered a Conti Ransomware Attack February 2, 2022 In mid-December 2021, pub and hotel chain McMenamins suffered a Conti ransomware attack that disrupted several of its computer systems....
Blog Post Magecart Hackers Now Hide PHP-Based Backdoor in Website Favicons June 7, 2021 Recently, security researchers have observed criminal activity in the realm of the cyber world by a cybercriminal group named Magecart...
Blog Post 26M Stolen Cards are Rescued by Hacker October 16, 2019 Recently, BriansClub, one of the largest online marketplaces known for selling stolen card data, has been hacked. This data breach...
Blog Post Cornerstone Payment Systems Leaked 6.7M Records February 3, 2020 Recently, Cornerstone payment processing company was found failing to protect its database containing credit card transactions. The Cornerstone Payment System...
Blog Post Student Faces 20 Years in Prison for Pandemic Puppy Scam January 18, 2022 While the pandemic might have brought the rest of the world to a standstill, cybercriminals and threat actors thrived. As...
Blog Post Over 40 Million T-Mobile Customers’ Data Stolen September 15, 2021 Over the weekend in mid-August, a supposed hacker bragged in online forums about having successfully carried out a data breach...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding...
Blog Post Hacker-For-Hire Continues To Exploit Entities Around The Globe January 11, 2022 Information about a well-known hacker-for-hire company that continues to exploit entities was released recently. Since its commencement in 2015, the...
Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
Blog Post Cross Section of the Conti Ransomware Attack and its TTPs May 10, 2021 The first mention of Conti ransomware is from May 2020. It is characterized by its rapid spread to systems and...
Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...