When it comes to disasters we all hope that our vehicle will get us out of dodge if needed… But, what would you do if there was an EMP attack? An electromagnetic pulse attack (EMP) is a burst of electromagnetic energy, it can be a natural occurrence or man-made. The problem is, there is no
Think Your Cyber Insurance is Going to Cover that $6 Million attack in Cyber Fraud? Think Again.
The latest tale of an organization falling victim to a business email compromise cyber attack on their credit card processor highlights how very specific the scenario needs to be to see a payout. In 2018, RealPage, a Texas-based service provider for property owners and property management companies was the victim of a cyber attack that
1 in 4 Business Email Compromise Attacks Use Lookalike Domains to Trick Victims
The latest Data on BEC scams shows how the bad guys are using a mix of Gmail accounts, increases in stolen wire transfers, and a shift to payroll diversions to trick you out of your money from email attacks.
Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims
The use of impersonation in phishing attacks helps to establish credibility and a sense of ease. New data shows exactly how the bad guys are using this tactic to their advantage. We’ve covered impersonation scams before where cybercriminals pretend to be your CEO, hospital personnel, or even the government. New data from cybersecurity vendor Agari
Vendor Email Compromise is Officially A Big (Seven-Figure) Problem
While the Solarwinds “sunburst” attack brought to light the compromising of a vendor, Vendor Email Compromise has been around for some time and now seems to be going mainstream. We first mentioned Vendor Email Compromise (VEC) back in late 2019. This method of compromising an email account at one company purposely to use it to
Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials
A new social engineering scam demonstrates how cybercriminals are both evolving their tactics while still using tried and true methods that just work to attain their goals. I’ve covered scams impersonating Office 365 I don’t know how many times. But it’s not very often you hear about a scam that uses LinkedIn as both its
New Dutch Data Breach Report Warns of Explosive Increase in Cyber Attacks and Stolen Personal Data
New Dutch Data Breach Report Warns of Explosive Increase in Cyber Attacks and Stolen Personal Data The Dutch Data Protection Authority (AP) recently measured the number of reports of data theft in 2020 and the number of attacks skyrocketed. The report documented that it increased no less than 30% in 2020 compared to the year
Microsoft Dominates as the Most Impersonated Brand in Phishing Attacks
Microsoft Dominates as the Most Impersonated Brand in Phishing Attacks
5 Major US Wireless Carriers Vulnerable to SIM Swapping Attacks
SIM Swapping Attacks 5 Vulnerable Major US Wireless Phone Carriers When it comes to protection against this insidious type of scam, the telcos’ authentication procedures leave a lot be desired, a study finds Five major US wireless carriers – AT&T, T-Mobile, Verizon, Tracfone and US Mobile – are susceptible to SIM swap scams, a danger
Millions of Modems at Risk of Remote Hijacking
Remote Hijacking Causing Millions of Modems at Risk Multiple cable modem models from various manufacturers found vulnerable to takeover attacks Hundreds of millions of cable modems from various manufacturers may be susceptible to a critical vulnerability that can enable attackers to intercept people’s private messages or redirect their internet traffic, new research has found. Tracked
5 Tips to Avoid Spear-Phishing Attacks
Avoid Spear-Phishing Attacks With These 5 Tips The word “Burisma” is all over the news at the moment – it’s a Ukranian energy company that, according to some claims, was broken into by Russian hackers looking for sensitive data to steal. As you can imagine, the way the hackers got in is supposed to have
Mobile Banking Malware Up 50% in First Half of Year
Financial Malware Attacks on Mobile Banking Increases More Than Half Already This Year A new report from Check Point recaps the cybercrime trends, statistics, and vulnerabilities that defined the security landscape in 2019. In the last year, 28% of organizations were hit with a botnet infection. Roughly one-third of cyberattacks were perpetrated by insiders, and 27% of