Emotions about the global pandemic are running high, and attackers are taking advantage. Researchers have observed criminals spreading malware by impersonating official sources, distributing malicious COVID-19 maps and trackers, and malvertising on coronavirus-related news stories.
As security professionals, we...
Data breaches expose a wealth of personal information that can enable cybercriminals to bypass security measures, take over accounts, and compromise enterprise networks. To provide a snapshot of the breach exposure affecting major enterprises, we examined SpyCloud's database and found:
412 million breach assets tied...
Account Takeover is now a ubiquitous term, and ATO prevention has become a high priority for cybersecurity leaders. But most of the effort is put toward thwarting high-volume, automated credential stuffing. Less understood are "targeted ATO attacks." Highly effective and difficult to detect, they cause huge damage to...
A key disconnect exists between awareness of financial services fraud schemes and mitigation, according to the latest "Faces of Fraud" survey sponsored by Appgate. Mike Lopez, vice president at the firm, describes some key findings.
Users - One of the Weakest Links in Your Cybersecurity Strategy
They say 'it's all about who you know' - for cybersecurity, that's partially true. If a cyberattacker knows your users, there's a good chance they can get into your network. Why? Because they can take what they know - usually an email address or...
Designing Security as a User Experience
The ongoing battle between attackers and defenders have left valid users caught in the middle. Protecting user accounts with aggressive security policies leads to false positives and needlessly locks valid users out of their account, while lenient security policies lead to...
Account Takeover is one of the biggest threats that banks are facing today. With 3.8 billion data records compromised worldwide in 2018, it is evident that despite implementation of cybersecurity measures, digital channels remain vulnerable. Adversaries have a variety of weapons at their disposal, which makes...
Every year, the SpyCloud Credential Exposure Report examines the data cybercriminals have been sharing over the last year and what it means for enterprises and consumers. Our 2020 report shows that password reuse continues to be a serious problem, leaving enterprises and their customers vulnerable to account takeover...
For close to three years, a technology executive was hounded by a persistent attacker who stole his identity, opened credit cards in his name, and wired funds from his bank account. Though SpyCloud helped bring this particular criminal to justice, these tactics are common in targeted attacks.
If your account...
Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don't have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don't get caught in a phishing net! Learn how to avoid...
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Eugene Liderman, Director of Mobile Security Strategy, Google, outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as...
The EU's second Payments Services Directive is alive and well. And although PSD2's Regulatory Technical Standards have technically been in place since September of this year, they won't actually be actively enforced or supervised for roughly one year. But where are financial institutions now re: compliance and...
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3-D Secure (also sometimes referred to as 3-D Secure 2.0) stand out? The big differentiator with EMV 3DS in emerging regulations and standards is that it's tied to law - not just recommendations.
Dowload...
Watch this live Q&A with Brian Hay, former detective superintendent from the Queensland Police Service and now executive director of Cultural Cyber Security, as he helps organizations understand and develop their business strategies to ensure the highest levels of security.
The new 5G mobile networks are coming, and with them comes the promise of people, industries and things connecting on an unprecedented scale. And also with 5G come significant security concerns about secure infrastructure, connected devices and a new multifaceted attack surface. Telecommunications giant Huawei is one...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.