-
$43 billion stolen through Business Email Compromise since 2016, reports FBI
PRIVACY PRIVACY The FBI’s Internet Crime Complaint Center (IC3) has issued updated statistics on Business Email Compromise (BEC) attacks which use a variety of social engineering and phishing techniques to break into accounts and trick companies into transferring large amounts of money into the hands of criminals. Read more in my article on the Tripwire…
-
Latest Cohort Announced for NCSC For Startups
PRIVACY PRIVACY The new cohort was chosen for their innovative approaches to tackling the growing ransomware threat Read More
-
Chinese APT group Mustang Panda targets European and Russian organizations
PRIVACY PRIVACY A cyberespionage group whose targeting has historically been aligned with China’s geopolitical interests has been targeting European and Russian entities using topical spear-phishing lures connected to the war in Ukraine. The group, tracked as Mustang Panda, RedDelta, Bronze President or TA416 by different cybersecurity firms, has been active since at least 2012 and…
-
15.3 Million Request-Per-Second DDoS Attack
PRIVACY PRIVACY Cloudflare is reporting a large DDoS attack against an unnamed company “operating a crypto launchpad.” While this isn’t the largest application-layer attack we’ve seen, it is the largest we’ve seen over HTTPS. HTTPS DDoS attacks are more expensive in terms of required computational resources because of the higher cost of establishing a secure…
-
See me speak at Cyber Security Nordic – either in Helsinki or online
PRIVACY PRIVACY In my keynote I’ll be discussing whether cybercriminals really are evil geniuses (as the media and some security vendors would like us to believe), or not… Save 50% off the ticket price using a discount code. Read More
-
South Korea Admitted to NATO Cyber Defense Center
PRIVACY PRIVACY Country becomes first Asian nation to join the group Read More
-
9 top identity and access management tools
PRIVACY PRIVACY Identity and access management (IAM) has long been a key proving ground of security leaders’ careers, with many a make-or-break decision made over identity technology deployments. Assuring secure access and managing identities is at the very foundation of cybersecurity postures. At the same time, the ways people, applications and systems log in and…
-
NHS Inboxes Hijacked to Send 1000+ Malicious Emails
PRIVACY PRIVACY Phishing campaign relied on individually compromised users Read More
-
FBI: Thailand and Hong Kong Banks Used Most in BEC
PRIVACY PRIVACY Email compromise could be a $43bn problem Read More
-
Smashing Security podcast #273: Password blips, and who’s calling the airport?
PRIVACY PRIVACY We find out why calls to Dublin airport’s noise complaints line have soared, and Carole quizzes Graham to celebrate World Password Day. All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast, with computer security veterans Graham Cluley and Carole Theriault. And don’t miss our special featured…