This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
It’s difficult not to hum a tune whenever the phrase “accepted the risk” comes up if you’ve ever seen this excellent infosec industry parody. According to the FBI, BEC scams are the most costly form of cybercrime today. First American is not out of the regulatory woods yet from this enormous data leak.
I seem to be doing most of that activity now on Mastodon , which appears to have absorbed most of the infosec refugees from Twitter, and in any case is proving to be a far more useful, civil and constructive place to post such things. 24, Russia invades Ukraine, and fault lines quickly begin to appear in the cybercrime underground.
is causing cyber legislation delays, fake browser updates are scamming users with malware, and another cybercrime site was taken down this past week. Catch up on all the latest InfoSec updates in this week’s Friday Five! Trouble in D.C.
Since 2017, host Jack Rhysider has investigated some of the most noteworthy stories related to the darkside of the internet, specifically hacking, data breaches, and cybercrime. It requires some baseline industry knowledge, but it’s a great way to stay on top of InfoSec current events. Malicious Life. 5 stars, 670 ratings.
The truth is technology has grown at an exponential rate and so has cybercrime. Cybercrime doesn’t just affect big businesses and national governments. Impersonation Scams. Although BEC attacks may be targeted at business, they can also be used to scam individual people. What You Can Do.
Build security awareness training modules to educate your employees on how to spot phishing emails or business-related scams. Given the rising threat of cybercrime, it’s our responsibility as cybersecurity professionals to do our part in maintaining strong cyber hygiene practices and lead from the top down.
Our speakers discussed a range of hot cyber topics, including business email compromise (BEC) scams, cyber warfare, Zero Trust, burnout, and so much more. Time is of the essence when it comes to cybercrime, as criminals can quickly launder cryptocurrencies across the world.
My gift to you this holiday season is a list of tips that will help you as a customer avoid adding cybercrime to that long list of stressors. Cybercriminals have become increasingly sophisticated when developing email phishing scams to collect your sensitive information and data or install malware on your devices.
But in the rush to transition online, we were all made more vulnerable to cyber infiltrations and scams than ever before. I’ve been in infosec for over 30 years and have had the great privilege of evolving and learning as a cybersecurity executive in a space I love. The mountain of delivery boxes in my garage can vouch for that !
In this report, we explore Scattered Spider’s evolution from low-level cybercrimes to partnering with ransomware groups to target major organizations. In February 2024, ALPHV conducted an exit scam against its affiliates and disbanded, leaving them searching for new partners.
Cybersecurity programs that educate your entire team on general information security tactics – including recognizing and addressing phishing scams – are essential. I’ve been in infosec for over 30 years and have had the great privilege of evolving and learning as a cybersecurity executive in a space I love.
In this report, we explore Scattered Spider’s evolution from low-level cybercrimes to partnering with ransomware groups to target major organizations. In February 2024, ALPHV conducted an exit scam against its affiliates and disbanded, leaving them searching for new partners.
Whether it’s helping hospitals avoid becoming the next ransomware victim or kneecapping new COVID-19-themed scam websites, these nascent partnerships may well end up saving lives. At least three major industry groups are working to counter the latest cyber threats and scams.
Cybercrime will go to the next level: Cyberattackers will implement improved skills, “shift left” attacks, and shifting strategies to adjust to evolving cyberdefense. AI-Powered Cybercrime Despite the advancements in using AI to improve security, cybercriminals also have access to AI and LLMs.
Cybersecurity programs that educate your entire team on general information security tactics – including recognizing and addressing phishing scams – are essential. Know how to identify malicious activities like phishing scams and understand how to safely address them. Ransomeware-as-a-Service.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content