September 15, 2016 Misconfigured NTP Servers Serve as a DDoS Resource 2 min read - A quarterly report from Akamai found that attackers are increasingly leveraging misconfigured NTP servers to launch DDoS attacks.
September 13, 2016 CryLocker Tries to Hide Its Loot 2 min read - The CryLocker malware family's novel approach to file management makes it difficult for victims to recover their data, even if they pay a ransom.
Fraud Protection August 10, 2016 Tracking Online Fraud: Check Your Mileage Against Endpoint Data 2 min read - A new study analyzed 500,000 endpoints as a method of tracking online fraud. The 10,000 that were found to be compromised shared seven commonalities.
June 20, 2016 Extra Helpings of Hacked Servers? Compromised Machines Hit Low Prices on the Dark Web 2 min read - Nearly 70,000 hacked servers are currently for sale on the Dark Web. Could this be the start of a new era of cybercrime marketplaces?
Threat Intelligence June 6, 2016 The Growing Threat From Emerging Cybercrime Markets 3 min read - As more people gain internet access around the globe, new cybercrime markets begin to appear. Here's what you should know about this new threat.
April 12, 2016 Study Shows Dark Web Isn’t as Large or Illegal as Previously Thought 2 min read - While the Dark Web has a poor reputation, a recent study from security researchers found it may not be as expansive or as criminal as many believe.
February 19, 2016 Taking the Bait: Leaked Data Grabs Attackers’ Attention 2 min read - A recent study highlighted how quickly cybercriminals go after leaked data as well as what they do with that information after it's been compromised.
Software Vulnerabilities January 19, 2016 Blind SQL Injection: The Last Handkerchief Up the Attacker’s Sleeve 2 min read - Blind SQL injections are still being leveraged by actors to steal information. Here's what users need to know about these persistent attacks.
January 11, 2016 In Bad Taste? EU Cookie Law Exploited by Clickjackers 2 min read - The EU's Cookie Law is intended to increase user privacy, but some cybercriminals have found a way to use it for their own gain.
January 7, 2016 How Can I Hack You Today? Cybercriminals Drum Up Business With Solid Customer Support 2 min read - Today's cybercriminals are tasked with providing exemplary customer service and support to go along with their malware offerings.