Reports

Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacksGroup-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks

Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks

Security firm Group-IB has estimated that in H2 2017-H1 2018 cyber attacks caused $49.4 million (2.96 billion rubles) of damage…

7 years ago
BEC scams, hacked accounts available from $150 up to $5,000BEC scams, hacked accounts available from $150 up to $5,000

BEC scams, hacked accounts available from $150 up to $5,000

Security experts from Digital Shadows have conducted an interesting study about the technique adopted by crooks to infiltrate company emails,…

7 years ago
Z-LAB Report – Analyzing the GandCrab v5 ransomwareZ-LAB Report – Analyzing the GandCrab v5 ransomware

Z-LAB Report – Analyzing the GandCrab v5 ransomware

Experts at the Cybaze Z-Lab have analyzed the latest iteration of the infamous GandCrab ransomware, version 5.0. Malware researchers at…

7 years ago
Akamai Report: Credential stuffing attacks are a growing threatAkamai Report: Credential stuffing attacks are a growing threat

Akamai Report: Credential stuffing attacks are a growing threat

According to Akamai's latest State of the Internet report on credential stuffing, credential stuffing continues to be growing threat. According to Akamai…

7 years ago
Dissecting the first Gafgyt bot implementing the “VanillaUPX technique”Dissecting the first Gafgyt bot implementing the “VanillaUPX technique”

Dissecting the first Gafgyt bot implementing the “VanillaUPX technique”

Experts at the CSE Cybsec Z-Lab have found a Gafgyt variant implementing the VanillaUPX technique recently presented in a cybersecurity…

7 years ago
Evolution of threat landscape for IoT devices – H1 2018Evolution of threat landscape for IoT devices – H1 2018

Evolution of threat landscape for IoT devices – H1 2018

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. What is infecting…

7 years ago
GAO Report shed the lights on the failures behind the Equifax hackGAO Report shed the lights on the failures behind the Equifax hack

GAO Report shed the lights on the failures behind the Equifax hack

A new report from the U.S. Government Accountability Office (GAO) provides detailed information of the Equifax hack. The Equifax hack…

7 years ago
The main source of infection on ICS systems was the internet in H1 2018The main source of infection on ICS systems was the internet in H1 2018

The main source of infection on ICS systems was the internet in H1 2018

Researchers from Kaspersky have published a new report on the attacks on ICS systems observed by its products in the…

7 years ago
Android mobile devices from 11 vendors are exposed to AT Commands attacksAndroid mobile devices from 11 vendors are exposed to AT Commands attacks

Android mobile devices from 11 vendors are exposed to AT Commands attacks

A group of researchers has conducted an interesting study on AT commands attacks on modern Android devices discovering that models…

7 years ago
2.6 billion records exposed in 2,308 disclosed data breaches in H12.6 billion records exposed in 2,308 disclosed data breaches in H1

2.6 billion records exposed in 2,308 disclosed data breaches in H1

According to a report from cyber threat intelligence firm Risk Based Security some 2.6. billion data records have been exposed in data…

7 years ago