Palo Alto warns of BEC-as-a-service, finds average wire fraud attempted is $567,000 with peak of $6 million

Business email compromise (BEC) continues to cost victims thousands — and sometimes millions — of dollars, according to a new report from Palo Alto Networks’ threat research group Unit 42.…

Foiling Cybercrime Around the World – An Interview with a Cybercrime Investigator

The threat of ransomware has grown dramatically in recent years. The recent emergence of ransomware as a service (RaaS) has made it possible for those with little technical know-how to…

Halloween comes early for Syniverse, Facebook, and Twitch: What we can learn from their spooky outages plus breaches

It looks like more than ghosts are wreaking havoc on haunted networks. We’re less than a full week into October, and Cybersecurity Awareness Month isn’t quite taking shape the way…

Google analysed 80 million ransomware samples: Here's what it found

Image: Google Google has published a new ransomware report, revealing Israel was far and away the largest submitter of samples during that period. The tech giant commissioned cybersecurity firm VirusTotal…

Customers On Alert as E-Commerce Player Leaks 1.7+ Billion Records

Customers On Alert as E-Commerce Player Leaks 1.7+ Billion Records A Brazilian e-commerce firm has unwittingly exposed close to 1.8 billion records, including customers’ and sellers’ personal information, after misconfiguring…

Magnitude Exploit Kit: Still Alive and Kicking

Avast –  Avast –  If I could choose one computer program and erase it from existence, I would choose Internet Explorer. Switching to a different browser would most likely save…

DirtyMoe: Introduction and General Overview of Modularized Malware

Avast –  Avast –  The rising price of the cryptocurrency has caused a skyrocketing trend of malware samples in the wild. DDoS attacks go hand in hand with the mining…

Volodya/BuggiCorp Windows exploit developer: What you need to know

Check Point researchers unveiled the identity of two authors responsible for zero-day attacks on Windows using a novel technique that allows them to recognize and identify malicious developers. According to…