newsThe US offers a $2.5M bounty for the arrest of Angler Exploit Kit co-distributorThe State Department has placed a bounty of up to $2.5 million on information leading to Volodymyr Kedariya’s arrest.By Shweta Sharma29 Aug 20243 minsHackingCybercrime news Ransomware attack paralyzes milking robots — cow deadBy Martin Bayer07 Aug 20242 minsRansomwareAgriculture IndustryCybercrimenews analysis North Korean group infiltrated 100-plus companies with imposter IT pros: CrowdStrike reportBy Cynthia Brumfield06 Aug 20248 minsCyberattacksThreat and Vulnerability ManagementCybercrime newsWho are the two Russian convicts released in the US-Russia prisoner swap?By Shweta Sharma 02 Aug 20243 minsCybercrime featureHow cybercriminals recruit insiders for malicious actsBy Dov Lerner 16 Jul 202417 minsCybercrime featureLogic bombs explained: Definition, examples, preventionBy Josh Fruhlinger 05 Jul 202412 minsMalwareCybercrimeSecurity brandpostSponsored by CyberArkWhy identity security Is essential to cybersecurity strategyBy Claudio Neiva, CyberArk’s Field Technology Director (LATAM), PAM and Identity Security 24 Jun 20246 minsCybercrime brandpostSponsored by CyberArkUnderstanding APIs and how attackers abuse them to steal dataBy John Walsh, senior product marketing manager at CyberArk 24 Jun 20245 minsCybercrime newsScattered Spider arrest in Spain unlikely to stop cybercrime groupBy John Leyden 18 Jun 20244 minsCybercrime ArticlesbrandpostSponsored by CyberArkThe growing threat of identity-related cyberattacks: Insights into the threat landscapeNew CyberArk research finds the rise of machine identities and increasing reliance on third-party providers is deepening threats and creating novel vulnerabilities.By Brandon Traffanstedt, senior director in CyberArk’s Field Technology Office 14 Jun 2024 6 minsCybercrimefeatureDeepfakes: Coming soon to a company near youAI-powered deepfake technology is rapidly advancing, and it’s only a matter of time before cybercriminals find a business model they can use, some security experts say.By Grant Gross 14 Jun 2024 8 minsPhishingCybercrimenewsMicrosoft: The brand attackers love to imitateCybercriminals often hide attack attempts behind well-known brand names with the intent to trick targeted users into making the fatal click. Microsoft is their favorite — by far.By Martin Bayer 03 Jun 2024 3 minsPhishingEmail SecurityCybercrimenews‘Operation Endgame’ deals major blow to malware distribution botnetsThe law enforcement operation has disrupted key infrastructure of the cybercrime ecosystem in what may be the largest botnet takedown of all time.By Lucian Constantin 30 May 2024 4 minsBotnetsMalwareCybercrimenewsWorld’s largest botnet seized in Federal bust, Chinese national arrestedThe botnet infected computers in nearly 200 countries, facilitating financial fraud, identity theft, and child exploitation.By Shweta Sharma 30 May 2024 4 minsBotnetsCybercrimenewsKroll cyber threat landscape report: AI assists attackers AI is simplifying all sorts of tasks — and not always for the better: cybercriminals, too, are adopting it.By Lynn Greiner 24 May 2024 4 minsThreat and Vulnerability ManagementCybercrimeVulnerabilitiesnews analysisEmerging ransomware groups on the rise: Who they are, how they operateNew and developing ransomware gangs move to fill the void left by the shutdown and law enforcement disruption of big players, with differing tactics and targets.By Lucian Constantin 24 May 2024 6 minsRansomwareCybercrimenewsTracking manual attacks may deliver zero-day previewsAccording to analysis from LexisNexis, human-based digital fraud attacks are increasing more quickly than bot-based attacks — a difference CISOs should leverage for their defenses.By Evan Schuman 23 May 2024 4 minsCyberattacksFraudCybercrimenewsLockBit no longer world’s No. 1 ransomware gangAfter dominating for eight months, LockBit has been overtaken by ransomware gang Play in the wake of a law enforcement crackdown and unmasking of LockBit’s alleged creator.By Viktor Eriksson 23 May 2024 2 minsRansomwareCybercrimenews analysisGlobal stability issues alter cyber threat landscape, ESET reportsWith conflict on the rise, regional APT groups are increasing activity, altering focus, and putting specific industries in their crosshairs. Here’s what CISOs should know.By Evan Schuman 20 May 2024 4 minsAdvanced Persistent ThreatsCyberattacksThreat and Vulnerability ManagementnewsBreachForums seized by law enforcement, admin Baphomet arrested Official telegram channels operated by BreachForums members confirm law enforcement seizures and arrest. By Shweta Sharma 16 May 2024 4 minsData BreachCybercrimenewsAdministrator of ransomware operation LockBit named, charged, has assets frozenA Russian national alleged to have been the administrator of the notorious and prolific LockBit ransomware provider faces international charges. A $10-million reward for the suspect’s arrest has been offered.By Lucian Constantin 07 May 2024 3 minsAdvanced Persistent ThreatsHacker GroupsRansomware Show more Show less View all Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeData and Information Security whitepaper Cyber resilience in the ransomware era By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeSecurity View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsPhishingEmail ClientsCybercrime An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsPhishingEmail ClientsCybercrime Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 PhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature Want to know how the bad guys attack AI systems? MITRE’S ATLAS can show you By Chris Hughes 20 Sep 202412 mins HackingThreat and Vulnerability ManagementMachine Learning feature What is pretexting? Definition, examples, and attacks By Josh Fruhlinger 20 Sep 202410 mins PhishingSocial EngineeringSecurity news Reveal of Chinese-controlled botnet is another warning to CISOs to keep up with asset and patch management By Howard Solomon 19 Sep 20246 mins BotnetsThreat and Vulnerability ManagementVulnerabilities podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: DocDoc’s Rubaiyyaat Aakbar on security technology 12 Sep 202419 mins Healthcare IndustryArtificial IntelligenceSecurity video CSO Executive Sessions: Hong Kong Baptist University’s Allan Wong on security leadership 05 Sep 202410 mins Education IndustryIT Leadership video CSO Executive Sessions: EDOTCO’s Mohammad Firdaus Juhari on safeguarding critical infrastructure in the telecommunications industry 05 Sep 202411 mins Telecommunications IndustryCritical InfrastructureSecurity