When ransomware hits, there are always 3 questions. How much? Did they pay? And the big one: How did the crooks get in?
Read moreAmazon Supplier Fraud
August 26 2020Interesting story of an Amazon supplier fraud: According to the indictment, the brothers swapped ASINs for items Amazon ordered to send large quantities of different goods instead. In one...
Read moreCybercrime in the Age of COVID-19
August 4 2020The Cambridge Cybercrime Centre has a series of papers on cybercrime during the coronavirus pandemic. EDITED TO ADD (8/12): Interpol report....
Read moreRansomware crooks keep adjusting their approach to make their demands more compelling, even against companies that say they'd never pay up.
Read moreMonday review – our recent stories revisited
July 27 2020Our most recent articles and videos, all in one place.
Read moreIf a crook is already inside your email, occasionally adding in believable emails of their own... how on earth do you spot the fake ones?
Read moreBusiness Email Compromise (BEC) Criminal Ring
July 10 2020A criminal group called Cosmic Lynx seems to be based in Russia: Dubbed Cosmic Lynx, the group has carried out more than 200 BEC campaigns since July 2019, according...
Read moreThe Unintended Harms of Cybersecurity
June 26 2020Interesting research: "Identifying Unintended Harms of Cybersecurity Countermeasures": Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks to their services or systems. In some...
Read moreSextortion again - but with "we hacked your website and stole all your data" instead of "we hacked your webcam and made a video".
Read moreRansomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT
February 24 2020Since at least 2017, there has been a significant increase in public disclosures of ransomware incidents impacting industrial production and critical infrastructure organizations. Well-known ransomware families...
Read more
Recent Comments