ATM malware has become a mainstay in many cybercriminals’ arsenal due to its capability to steal money. In our joint efforts with Europol’s EC3, we explain in detail how criminals continue to leverage different ATM malware families and attack types.
Identity theft is currently a gold mine for cybercriminals—one that reached an all-time high in 2016, with up to $16 billion worth of losses caused by fraud and identity theft. But what exactly happens with the stolen information? Read more
The third part of the “Leaking Beeps” series discusses the different types of IT systems connected with unencrypted pages that can be used by attackers for reconnaissance or intelligence gathering. Read more
Economic espionage should not only concern nation-states; any company, regardless of size, is at risk of losing intellectual property to attackers and rivals. What can enterprises do to defend against these attacks? Read more
While cybercriminals seem to be shying away from data theft to outright extortion as their main revenue source (cue in ransomware), stealing personal information and using or selling it for further cybercriminal acts is still a serious problem. Read more
A wave of data breaches on hospitals and other healthcare organizations has exposed personally identifiable information of patients and employees yet again, putting the industry in a difficult spot. Read more