Search Results for: criminals Blog Post How expired web domains help criminal hackers unlock enterprise defenses January 19, 2022 Managing a company’s security can feel like trying to keep an old, leaky boat afloat. As soon as you find... Blog Post Reformed Convicted Hacker Opens Up in Reddit AMA January 10, 2022 Daniel Kelley, a reformed British computer hacker who committed over £70,000,000 in damages, has decided to share his story and... Blog Post Student Faces 20 Years in Prison for Pandemic Puppy Scam January 18, 2022 While the pandemic might have brought the rest of the world to a standstill, cybercriminals and threat actors thrived. As... Blog Post Husband and Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies February 8, 2022 In recent times, Eastern Europe has emerged as somewhat of a safe haven and Wild West for various cybercriminal gangs,... Blog Post FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine January 21, 2022 In the never-ending fight against cybercrime, it’s rare for law enforcement to be the ones to strike it lucky. It’s... Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the... Blog Post French police detain suspect who laundered €19 million in ransomware payments January 20, 2022 In recent years, the public as a whole has become well-accustomed to high-profile ransomware attacks, especially since the global WannaCry... Blog Post US Government to Offer up to $5,000 ‘Bounty’ to Hackers to Identify Cyber Vulnerabilities January 27, 2022 A bug bounty program is one where an entity (usually a company) offers up a cash reward for anyone who... Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to... Blog Post Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Blog Post DOJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation November 24, 2021 International cybercrime sting operation leads to the seizure of weapons, drugs, and $31 million from DarkNet opioid traffickers. Operation Dark... Blog Post U.S. Offering $10 million to Track Down Darkside Leadership December 10, 2021 On November 4th, the U.S. government announced a reward of up to $10 million for any information that could lead... Blog Post Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Blog Post HolesWarm (Crypto-Miner) Malware Targeted Unpatched Windows and Linux Servers September 16, 2021 Researchers at a security firm named Tencent have recently revealed details about the botnet crypto-miner. For the record, the crypto-miner... Blog Post Digital Forensics: Phases and Importance February 14, 2022 Digital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it...
Blog Post How expired web domains help criminal hackers unlock enterprise defenses January 19, 2022 Managing a company’s security can feel like trying to keep an old, leaky boat afloat. As soon as you find...
Blog Post Reformed Convicted Hacker Opens Up in Reddit AMA January 10, 2022 Daniel Kelley, a reformed British computer hacker who committed over £70,000,000 in damages, has decided to share his story and...
Blog Post Student Faces 20 Years in Prison for Pandemic Puppy Scam January 18, 2022 While the pandemic might have brought the rest of the world to a standstill, cybercriminals and threat actors thrived. As...
Blog Post Husband and Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies February 8, 2022 In recent times, Eastern Europe has emerged as somewhat of a safe haven and Wild West for various cybercriminal gangs,...
Blog Post FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine January 21, 2022 In the never-ending fight against cybercrime, it’s rare for law enforcement to be the ones to strike it lucky. It’s...
Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the...
Blog Post French police detain suspect who laundered €19 million in ransomware payments January 20, 2022 In recent years, the public as a whole has become well-accustomed to high-profile ransomware attacks, especially since the global WannaCry...
Blog Post US Government to Offer up to $5,000 ‘Bounty’ to Hackers to Identify Cyber Vulnerabilities January 27, 2022 A bug bounty program is one where an entity (usually a company) offers up a cash reward for anyone who...
Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to...
Blog Post Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone...
Blog Post DOJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation November 24, 2021 International cybercrime sting operation leads to the seizure of weapons, drugs, and $31 million from DarkNet opioid traffickers. Operation Dark...
Blog Post U.S. Offering $10 million to Track Down Darkside Leadership December 10, 2021 On November 4th, the U.S. government announced a reward of up to $10 million for any information that could lead...
Blog Post Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions...
Blog Post HolesWarm (Crypto-Miner) Malware Targeted Unpatched Windows and Linux Servers September 16, 2021 Researchers at a security firm named Tencent have recently revealed details about the botnet crypto-miner. For the record, the crypto-miner...
Blog Post Digital Forensics: Phases and Importance February 14, 2022 Digital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it...