Dain Drake was CEO of a steel fabrication factory. In June 2019, Drake found himself standing outside a closed adult boutique in Houston at 10:00 a.m. on a Sunday. He called the owner and pleaded for him to come. He needed something inside, which might just save his business - from ransomware.
See how one company stopped an attack in 19 minutes! Imagine a cunning phisher: he knows his craft and sends your users an email appearing to come from your CEO that bypasses all your other technology. What would you do? A Cofense customer faced that very scenario and relied on Cofense to analyze, respond to, and...
If you receive a sextortion email at work, how did the criminals find you? Do they really have embarrassing videos, your browsing history, or password? Cofense can shed some light on this dark corner of the web. After all, we’ve been monitoring the largest confirmed dump of email addresses used for sextortion to...
A Texas nonprofit, safety net medical center is still struggling to fully bring its communications and other systems back online two weeks after a ransomware attack in which cybercriminals have demanded a ransom in the "tens of millions of dollars.
Chinese state-backed cyber spies developed a Linux variant of a Windows backdoor to target a Hong Kong university after Beijing squashed pro-democracy protests in the city. The threat group, called SparklingGoblin, deployed the custom-built implant in February 2021, Eset researchers say.
Software point of sale or SoftPOS is a groundbreaking technology that allows businesses to accept card payments directly on their devices without requiring any additional software. As this payment method gains widespread adoption, what does it mean for the security of our payments systems?
The latest edition of the ISMG Security Report discusses the appearance at a Senate hearing this week by the former head of security for Twitter; the top-performing web application and API protection vendors, according to Gartner's Magic Quadrant 2022; and threat trends to watch for in 2023.
The specter of Chinese data collection on U.S. citizens hung over Capitol Hill in a pair of hearings as lawmakers asked whether an open internet can survive challenges such as Beijing hacking and TikTok. An executive for the short-form video app made a rare appearance before a Senate committee.
The U.S. government accused Iran of turning a blind eye to ransomware hackers after indicting three men affiliated with the Islamic Revolutionary Guard Corps. Authorities say their attacks affected critical infrastructure including healthcare centers, transportation services and utility providers.
New malware variants are being developed at breakneck speeds, each more sophisticated and devastating than the last. On top of that, successful threats are being commodified by initial access brokers (IAB) and sold as-a-service. Threats are propagating faster than ever with stealthy evasion techniques coded in,...
As a leader in insurance and asset management, this Fortune 200
company recognizes that its security must protect its employees and
customers from cyber attacks. Customers place their trust and their assets
in the control of this company, so the security team built a robust solution
reducing risk, gaining...
Compromised accounts may be the most dangerous email threat that organizations face. Once an account has been compromised, it can be used to execute additional attacks—providing threat actors a variety of opportunities to steal funds and sensitive information.
And because the messages are being sent from the...
Supply chain compromise attacks cost an average of $183,000. You should be prepared.
In this white paper from Dr. Eric Cole at Secure Anchor, learn how attackers leverage compromised accounts from vendors or partners to launch attacks that are specifically designed to bypass traditional email security. These...
Credential phishing attacks represent a huge threat to organizations as a well-crafted (or even somewhat realistic-looking) phishing email can trick an employee into providing login credentials.
In our threat report covering data from January-June 2022, Abnormal Security found a 48% increase in email attacks over...
Ransomware-wielding criminals feel the need for speed as they seek to take down victims more quickly and quietly. Cue the use of intermittent, or partial, encryption to speed up attacks. It scrambles files partially but enough to make them unusable.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.