Fraud Protection May 23, 2017 Cybercrime Has Become a Commodity 2 min read - Cybercrime tools available through private networks and on the Dark Web make it easier than ever for would-be fraudsters to infiltrate networks.
January 30, 2017 Risk Reduction: Zeroing In on the Zero-Day Vulnerability 2 min read - A zero-day vulnerability can be absolutely catastrophic for an organization. Zero-day exploits remain popular and widely available on Dark Web forums.
Fraud Protection January 26, 2017 The Dark Web Marketplace: A Shopping Center for Attackers 2 min read - Cybercriminals are steeped in a culture of trading malicious tools. This Dark Web marketplace drives the evolution of the cyberthreat landscape.
January 17, 2017 Asia-Pacific Ransomware Attacks Emerge in the U.S. 2 min read - Researchers have observed an increase in Asia-Pacific ransomware so far in 2017. Variants of these sophisticated attacks are likely to emerge in the U.S.
December 12, 2016 Popcorn Time Wants Your Money, but Will Settle for Your Buddy’s 2 min read - Ransomware variant Popcorn Time offers its victims a choice: Pay the ransom or sell out your buddy for a free decryption key to recover your stolen data.
July 12, 2016 Patchwork Problems: Copy-Pasted Code Creates New APT Threat 2 min read - Old copied-and-pasted code is enjoying a rejuvenation in the form of Patchwork, a malware that's making the most of its second chance.
June 20, 2016 Extra Helpings of Hacked Servers? Compromised Machines Hit Low Prices on the Dark Web 2 min read - Nearly 70,000 hacked servers are currently for sale on the Dark Web. Could this be the start of a new era of cybercrime marketplaces?
May 23, 2016 117 Million LinkedIn Email Details Hit the Dark Web — Business as Usual? 2 min read - A years-old hack led to more than 117 million LinkedIn email addresses and passwords being posted online — and this isn't the only hack getting headlines.
April 12, 2016 Study Shows Dark Web Isn’t as Large or Illegal as Previously Thought 2 min read - While the Dark Web has a poor reputation, a recent study from security researchers found it may not be as expansive or as criminal as many believe.
X-Force March 18, 2016 Is It the Breadth of the Breach or the Value of the Volume? 3 min read - Organizations that suffer a breach face extremely high costs, but cybercriminals don't have to cough up as much to start building profiles of victims.