This post unpacks the criminal elements in the ransomware ecosystem: from developers and distributors to negotiators and even PR specialists.
Cybercrime is a term that encompasses any criminal activity involving the use of digital technology or communication, such as the internet, computers, or smartphones. In most cases, these crimes are financially driven but attacks may also be politically or personally motivated. Cybercrime can include a wide range of activities, such as fraud, theft, cyberstalking, ransomware, malware distribution, and so many others.
Combating cybercrime is a highly complex and ever-evolving challenge due to the dynamic nature of the threat landscape. And understanding the threat landscape requires in-depth threat intelligence on the identity of cybercriminals, their preferred attack techniques, their motives, operational tactics, their areas of focus, and more.
Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, as well as prevention and protection.
Phishing as a Service is a pervasive threat that has transformed phishing tools into commercial products made easily accessible to the masses.
Attackers have been quick to weaponize IPFS, expanding the threat landscape. Here’s what you need to know about recent IPFS phishing attacks.
This last post in our social engineering prevention series provides guidance on what to do if you fall victim to a social engineering attack.
This broad overview of cybercrime includes the main types of cybercrime, underlying motivations, societal impact, and tactics for prevention.
This blog post offers social engineering countermeasures and provides guidance to minimize the risk of falling victim to these attacks.
Spear phishing at scale: A new era of AI fueled attacks where social engineering, social media, AI tools, and micro-targeting converge.
This post shares a few highly effective social engineering examples using micro-targeting techniques based on LinkedIn profile attributes.
From novice hackers to complex cybercriminal networks, see how attackers build detailed profiles of their social engineering attack targets.