In the today’s digital world, when so much of our lives are online, identity verification and authentication are critical to addressing fraud-related risk management challenges. To prevent fraud and protect your business and your customers, you must be certain the people you are dealing with are who they represent...
Social engineering scams are on the rise globally. Last year, these scams increased 57% with an average loss of $1,029 per victim. Aside from the inability of legacy fraud controls to detect real-time social engineering, the circumstances of a scam can influence liability if the parties involved are unable to recover...
Sercan Oyuntur, a 40-year-old California resident, has been found guilty of stealing payments of over $23 million from the U.S. Department of Defense, according to the U.S. Department of Justice. The stolen payment was meant for DOD's jet fuel suppliers.
Even powerful brands are not immune from fake users; in fact, they are often the most prominent targets. In Q4 of 2021 alone, Facebook removed 1.3 billion fake accounts.
Today, most ecosystems are littered with fake accounts set up to steal confidential information, post fake product reviews, spam legitimate...
Today’s sophisticated cyberattacks combine multiple tactics that include social engineering, zero-day malware and 3rd party OAuth app abuse. Threat actors employ tactics across email, cloud and web that target specific people in your organization to breach your environment and access sensitive data. Hybrid work...
Insights to help you quantify security risk.
The Cost of a Data Breach Report offers insights that help you understand risk in a changing world. Understand broad trends, and dive deeper into factors that can amplify costs or help mitigate financial losses. Register for the report to discover:
Cost mitigation...
You can’t secure what you can’t see. As the perimeter continues to morph with an increasingly distributed workforce, hybrid workplace, and rapid multi-cloud adoption, security and compliance exposures are intensifying. Unified and actionable visibility across all technologies including endpoints, software, cloud...
Nearly 20,000 attacks. An average loss of $120,000 per attack. Billions of dollars sent to cybercriminals each year. Business email compromise is no joke, and it’s continuing to increase—despite increased awareness of the issue.
Why? Because the people behind these scams know how to trick humans, relying on...
Skyrocketing attack rates, double and triple extortion, increasing ransom demands… cybercriminals are inflicting pain in every way imaginable when it comes to today’s ransomware attacks. And you need to be prepared to protect your network, NOW.
Find out the steps you need to take to minimize damage to your...
PIPEDREAM is the seventh known ICS-specific malware. The CHERNOVITE Activity Group (AG) developed PIPEDREAM. PIPEDREAM is a modular ICS attack framework that an adversary could leverage to cause disruption, degradation, and possibly even destruction depending on targets and the environment.
Dragos assesses with...
Researchers discovered a new social engineering-heavy malware campaign focused on defrauding employees in West Africa's banking sector. Although this campaign is not exactly new, it shows a detailed account of what social engineering looks like, according to cybersecurity veteran Tari Schreider.
Microsoft says it seized control of seven domains belonging to Russian GRU-linked state-sponsored threat group Strontium. The group, also called APT28 and Fancy Bear, used the domains to target Ukrainian media organizations and had U.S. and EU government entities and decision-makers on its radar.
APT-C-23, a politically motivated, Hamas-linked threat actor, is using fake Facebook profiles to trick high-ranking Israeli officials into downloading previously undocumented Trojanized Android and PC direct message applications that grant them access to the victims' devices.
Although the final weeks of 2021 will be remembered for the resurgence of the pandemic, driven by the new Omicron strain, the second half of the year marked the end of restrictions and the reopening of economies in many parts of the world.
What has become clearly apparent from analysis of the LexisNexis® Digital...
Researchers from Malwarebytes have found that cyberespionage actor UAC-0056, also known as SaintBear, UNC2589 and TA471, is now using a macro-embedded Excel document to target several entities in Ukraine, including ICTV, a private TV channel.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.