Cybercrime & Digital Threats
- July 27, 2017A Man-in-the-Middle (MitM) attack is a type of attack that involves a malicious element “listening in” on communications between parties, and is a significant threat to organizations.
- July 26, 2017A new ransomware with a unique behavior abuses a popular email application to send malicious email directly to its potential victims.
- July 21, 2017In this week’s recap, a popular open-source ransomware spawns more variants, and entries from other ransomware families also make an appearance.
- July 20, 2017Recent phishing incidents show that attackers are adopting new techniques and reusing old methods to target users and enterprises.
- July 11, 2017As Petya's dust settles, we learn another real-life lesson: old threats die hard. And as we saw last week, ransomware has no shortage of variety—no matter how dated their tactics and techniques may be.
- July 05, 2017As cryptocurrencies like bitcoin are more widely used, so will the threats that cybercriminals use to abuse it. Here’s a closer look at cryptocurrency-mining malware—their emergence in the threat landscape, impact, and some countermeasures against them.
- July 05, 2017One of the largest cryptocurrency exchange platforms in the world was hacked, with thousands of user accounts compromised.
- July 05, 2017The Petya and WannaCry outbreaks still dominate the conversation, but there are also new ransomware to watch out for.
- July 04, 2017A social engineering attack shut down a popular Ethereum Classic wallet. But apart from this type of attack there are more sophisticated threats on the landscape.