Security Cloud Courses About

Tagged With 'Cybercrime'

<< More tags

imgs/thumbnail.webp
US Federal Government Cybersecurity is Lacking

A new report from a United States Senate Committee gave 24 US department and agencies an average grade of C- in cybersecurity. That’s not good.

imgs/thumbnail.webp
Lazio & BlackMatter Bring Ransomware Into the Spotlight…Again

The region of Lazio was hit by a ransomware attack and is struggling to recover from this attack on critical infrastructure. BlackMatter, a new …

imgs/thumbnail.webp
Hackers Attempt To Extort Electronic Arts (EA), Fail, Then Leak Source Code

EA got hacked and 780 GB of source code was stolen. The hackers attempted to extort EA and when they didn’t pay, the data was dumped online.

imgs/thumbnail.webp
New Ransomware Resources For Defenders

Two new resources launched to help people understand the challenges associated with ransomware; StopRansomware.gov and RansomWhe.re

imgs/thumbnail.webp
REvil-ed Ransomware Group Goes Kaput?

REvil has been one of the top ransomware groups for the past few months but they’re suddenly offline. No note, no warning, just gone.

imgs/thumbnail.webp
Ransomware Attack On Kaseya Still Very Real For Victims

Long after the headlines pass, victims of ransomware are left struggling to get back to “normal” operations. It’s a long, …

imgs/thumbnail.webp
REvil Ransomware Criminals Look To Maximize Q3 Profits With Kaseya Attack

The REvil gang attack Kaseya, an IT management platform, and that got them access to 800—1,500 more businesses without any additional effort setting …

imgs/thumbnail.webp
What Makes Ransomware Successful and Why It Won't Ever Really Stop

Ransomware is absolutely everywhere. What is going on? Why is ransomware so effective? Is there anything we can do about it?

imgs/thumbnail.webp
What You Need To Know About the Colonial Pipeline Attack

Colonial Pipeline is recovering from a ransomware cyberattack. There’s a ton of attention on them right now, what do you need to know about this …

imgs/thumbnail.webp
Major Ransomware Services Busted

Emotet and NetWalker are both taken offline within days of each. A big wins for users, law enforcement, and international cooperation…at least …

imgs/thumbnail.webp
Legacy Authentication Risks

The Canada Revenue Agency suffered a large breach exposing over 5,000 citizens to COVID-19 benefit fraud. This issue exposes some of the challenges of …

imgs/thumbnail.webp
Protecting Yourself Black Friday Scams Online

Black Friday and Cybermonday are two of the biggest shopping days of the year. Consumers rush to get the biggest deals on all sorts of items. Sadly, …

imgs/thumbnail.webp
Business Email Compromise

Cybercriminals don’t always use complicated technical attacks to get around your cybersecurity. Sometimes—probably more often than we care to …

imgs/thumbnail.webp
Warrant Canaries

We rely on some digital services for critical functions around security and privacy. Trusting those services is paramount to their success and ours. …

imgs/thumbnail.webp
DNS Hijacking

There has been a significant increase in DNS hijacking attacks over the past couple of months…and why not? It’s a simple, direct way for …

imgs/thumbnail.webp
Cryptocurrencies & Cybercrime

Cryptocurrencies have dropped in popularity and value but cybercriminals continue undeterred. The latest on cybercrime and cryptocurrency…

imgs/thumbnail.webp
773M Credentials

It’s not uncommon for cybercriminals to combine multiple data sets in order to increase their chances of finding valid user credentials. …

imgs/thumbnail.webp
Law and The Internet

How much can one jurisdiction affect the internet? Turns out, a lot. Recent actions by the US and Australia are having and could have a …

imgs/thumbnail.webp
Politics & Attack Attribution

Cyberattack attribution is HARD. But time and time again, we’re seeing attributions—who carried out the attack—made publicly with little to no …

imgs/thumbnail.webp
Bloomberg, Supermicro, and Hardware Supply Chain Attacks

Bloomberg has an absolutely earth shattering report citing a hardware supply chain attack that—they say—impacted several big names. Here’s why …

imgs/thumbnail.webp
Cybersecurity Basics #7 - Hackers & Cybercriminals

Hackers and cybercriminals are all “malicious actors”. While you may not know who is attacking a system, having a better understanding of …

imgs/thumbnail.webp
Cryptocurrency & High Value Targets

Cryptocurrency is a digital asset. As such, it’s a major target for cybercriminals. We’ve seen attack after attack in the past few months …

imgs/thumbnail.webp
The Canadian Criminal Code on Hacking

Where does the Canadian criminal code stand on hacking? Given how fast technology moves, can the law keep up?

imgs/thumbnail.webp
Blocking IP Addresses

Is IP blocking still effective? Is it a sledge hammer when you really need a scalpel?

imgs/thumbnail.webp
One Billion Attacks Per Day

Accurate data for cybersecurity threats is hard to come by. That doesn’t mean you can just make it up…

imgs/thumbnail.webp
Rizenfall And Needless Hype

CPU Vulnerabilities Seem Like A Massive Problem. Are they deserving of the hype?

imgs/thumbnail.webp
DDoS Attacks & Community Responsibility

DDoS attacks are scaling to new heights using record numbers of compromised machines. What are your responsibilities to the rest of internet …

imgs/thumbnail.webp
Pyeongchang 2018 Olympic Games Hack

Cyberattacks happen all of the time. The critical angle to evaluate is their impact. Did the attack breach critical systems? Access personal …

imgs/thumbnail.webp
Heartbleed – One Week In

Great content from @marknca

imgs/thumbnail.webp
Whaling

This post provides information that is designed to help you defend against phishing, spear phishing, and whaling attacks. Exploring the reasons for …