attack

Cyber Insurance is might not Cover that $6 Million in Cyber Fraud

Think Your Cyber Insurance is Going to Cover that $6 Million attack in Cyber Fraud? Think Again.

The latest tale of an organization falling victim to a business email compromise cyber attack on their credit card processor highlights how very specific the scenario needs to be to see a payout. In 2018, RealPage, a Texas-based service provider for property owners and property management companies was the victim of a cyber attack that …

Think Your Cyber Insurance is Going to Cover that $6 Million attack in Cyber Fraud? Think Again. Read More »

Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims

Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims

The use of impersonation in phishing attacks helps to establish credibility and a sense of ease. New data shows exactly how the bad guys are using this tactic to their advantage. We’ve covered impersonation scams before where cybercriminals pretend to be your CEO, hospital personnel, or even the government. New data from cybersecurity vendor Agari …

Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims Read More »

iStock 1205460056252028129

Vendor Email Compromise is Officially A Big (Seven-Figure) Problem

While the Solarwinds “sunburst” attack brought to light the compromising of a vendor, Vendor Email Compromise has been around for some time and now seems to be going mainstream. We first mentioned Vendor Email Compromise (VEC) back in late 2019. This method of compromising an email account at one company purposely to use it to …

Vendor Email Compromise is Officially A Big (Seven-Figure) Problem Read More »

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

A new social engineering scam demonstrates how cybercriminals are both evolving their tactics while still using tried and true methods that just work to attain their goals. I’ve covered scams impersonating Office 365 I don’t know how many times. But it’s not very often you hear about a scam that uses LinkedIn as both its …

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials Read More »

New Dutch Data Breach Report Warns of Explosive Increase in Cyber Attacks and Stolen Personal Data

New Dutch Data Breach Report Warns of Explosive Increase in Cyber Attacks and Stolen Personal Data

New Dutch Data Breach Report Warns of Explosive Increase in Cyber Attacks and Stolen Personal Data The Dutch Data Protection Authority (AP) recently measured the number of reports of data theft in 2020 and the number of attacks skyrocketed. The report documented that it increased no less than 30% in 2020 compared to the year …

New Dutch Data Breach Report Warns of Explosive Increase in Cyber Attacks and Stolen Personal Data Read More »

5 major us wireless carriers vulnerable to sim swapping attacks

5 Major US Wireless Carriers Vulnerable to SIM Swapping Attacks

SIM Swapping Attacks 5 Vulnerable Major US Wireless Phone Carriers When it comes to protection against this insidious type of scam, the telcos’ authentication procedures leave a lot be desired, a study finds Five major US wireless carriers – AT&T, T-Mobile, Verizon, Tracfone and US Mobile – are susceptible to SIM swap scams, a danger …

5 Major US Wireless Carriers Vulnerable to SIM Swapping Attacks Read More »

millions of modems at risk of remote hijacking

Millions of Modems at Risk of Remote Hijacking

Remote Hijacking Causing Millions of Modems at Risk Multiple cable modem models from various manufacturers found vulnerable to takeover attacks Hundreds of millions of cable modems from various manufacturers may be susceptible to a critical vulnerability that can enable attackers to intercept people’s private messages or redirect their internet traffic, new research has found. Tracked …

Millions of Modems at Risk of Remote Hijacking Read More »

mobile banking app - Making Sense of Security

Mobile Banking Malware Up 50% in First Half of Year

Financial Malware Attacks on Mobile Banking Increases More Than Half Already This Year A new report from Check Point recaps the cybercrime trends, statistics, and vulnerabilities that defined the security landscape in 2019. In the last year, 28% of organizations were hit with a botnet infection. Roughly one-third of cyberattacks were perpetrated by insiders, and 27% of …

Mobile Banking Malware Up 50% in First Half of Year Read More »

Scroll to Top