Remove 2013 Remove Cyber Attacks Remove Phishing
article thumbnail

Cybercrime Year in Review: 2013

SiteLock

In its annual Data Breach Investigations Report , published at the beginning of 2013, Verizon revealed that businesses with fewer than 100 employees made up the single largest group of victims of data breaches. It was easy to buy hundreds of millions of email addresses, pack them with phishing messages, and attach a nasty malware payload.

article thumbnail

MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

The Last Watchdog

I talked to Phil Neray, vice president of industrial security at CyberX , a company founded in 2013 that operates a platform for real-time security of the industrial internet. With more connectivity between OT and IT the attack surface is broadened. Their intent is to disrupt society and establish power.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DarkTrace Cyber Protects Fashion retailer Ted Baker

CyberSecurity Insiders

Cyber Security firm DarkTrace that uses the technology of Artificial Intelligence to track down cyber threats is nowadays busy protecting the computer network of British Fashion retailer Ted Baker. Note 2- Established in 2013, Darktrace is a British American company that helps protect its users from various cyber attacks.

Retail 144
article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The epidemic went truly mainstream with the release of CryptoLocker back in 2013, and it has since transformed into a major dark web economy spawning the likes of Sodinokibi, Ryuk, and Maze lineages that are targeting the enterprise on a huge scale in 2020. FBI spoofs 2012 – 2013. File encryption 2013 – 2015.

article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Malicious actors are continually looking for better ways to carry out successful cyber attacks. This article focuses on the top five attack vectors organizations should look out for and defend against in 2022. Some threat actors carry out phishing attacks using social media and networking platforms, such as Twitter or LinkedIn.

IoT 137
article thumbnail

North Korea-linked APT Kimsuky targeted German defense firm Diehl Defence

Security Affairs

The Kimsuky APT group breached Diehl Defence through a sophisticated phishing campaign, reported the German newspaper Der Spiegel. The cyber attack was discovered by Google-owned cybersecurity firm Mandiant. The German defense firm also produces Iris-T air-to-air missiles recently acquired by South Korea.

article thumbnail

N. Korean Kimsuky APT targets S. Korea-US military exercises

Security Affairs

North Korea-linked APT Kimsuky launched a spear-phishing campaign targeting US contractors working at the war simulation centre. North Korea-linked APT group Kimsuky carried out a spear-phishing campaign against US contractors involved in a joint U.S.-South South Korea military exercise.