News & Commentaries >

  1. Financial institutions are one of the major targets of Business Process Compromise (BPC) attacks, as seen in the 2016 Bangladesh Bank incident in which $81 million was stolen during a sophisticated attack by abusing […]

    Business Process Compromise (BPC) Attack Hits Banks in Post-Soviet Countries

    Financial institutions are one of the major targets of Business Process Compromise (BPC) attacks, as seen in the 2016 Bangladesh Bank incident in which $81 million was stolen during a sophisticated attack by abusing […]
  2. Of all the potential horror stories that dissuade users from adopting Internet of Things (IoT) devices, one of the most common is the unauthorized monitoring of their private lives. One […]

    Google Home Mini Speaker Discovered Eavesdropping on Home User

    Of all the potential horror stories that dissuade users from adopting Internet of Things (IoT) devices, one of the most common is the unauthorized monitoring of their private lives. One […]
  3. A new variant of KOVTER (Detected by Trend Micro as TROJ_KOVTER.AUSKKM and TROJ_KOVTER.AUSKKL) was seen being spread through a new malvertising campaign perpetrated by a malvertising group called KovCoreG. The new […]

    New KOVTER Campaign Spreads via Malicious Advertisements in Pornhub

    A new variant of KOVTER (Detected by Trend Micro as TROJ_KOVTER.AUSKKM and TROJ_KOVTER.AUSKKL) was seen being spread through a new malvertising campaign perpetrated by a malvertising group called KovCoreG. The new […]
  4. How much are Supervisory Control and Data Acquisition (SCADA)port numbers in the cybercriminal underworld? In the Middle Eastern and North African underground, they’re free. Their underground marketplaces aren’t profit-driven like Russia’s, or China’s. There’s […]

    The Middle Eastern and North African Underground: Where Culture and Cybercrime Meet

    How much are Supervisory Control and Data Acquisition (SCADA)port numbers in the cybercriminal underworld? In the Middle Eastern and North African underground, they’re free. Their underground marketplaces aren’t profit-driven like Russia’s, or China’s. There’s […]
  5. A growing concern of security professionals is internal phishing attacks – phishing emails sent from one trusted user to another of the same organization. Internal phishing emails are used in multi-stage attacks […]

    When Phishing Starts From The Inside

    A growing concern of security professionals is internal phishing attacks – phishing emails sent from one trusted user to another of the same organization. Internal phishing emails are used in multi-stage attacks […]
  6. Yahoo! announced that all three billion of its user accounts were compromised in a 2013 data breach. This new number easily dwarfs an earlier figure of one billion exposed accounts. Yahoo! has already […]

    Yahoo!: All Three Billion User Accounts Affected in 2013 Data Breach

    Yahoo! announced that all three billion of its user accounts were compromised in a 2013 data breach. This new number easily dwarfs an earlier figure of one billion exposed accounts. Yahoo! has already […]

VIDEOS >