Remove Government Remove Mining Remove Presentation
article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world, the company presented latest cybercrime trends. A relatively new method of fraud on the ICO market was stealing a White Paper of ICO project and presenting an identical idea under a new brand name. About the author Group-IB.

Phishing 269
article thumbnail

Access to over 3,000 compromised sites sold on Russian black marketplace MagBo

Security Affairs

Most of the compromised websites are e-commerce sites, but crooks also offered access to websites of organizations in healthcare, legal, education and insurance industries and belonging to government agencies. According to the experts, most of the compromised servers are from U.S., Russian, or German hosting services.

Access 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. APT41’s activities span from the mid-2000s to the present day. One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. .”

article thumbnail

Free Tool: Honey Feed

Security Affairs

Hi folks, today I’d like to point you out another tool of mine which extracts suspicious IPs from undesired connections. Following a set of interesting and very selective graphic views are presented. In other words: HoneyPots. The feed is update every 24h, so it would be useless to make multiple downloads per day.

Honeypots 275
article thumbnail

Past, present and future in a digital transformation journey

OpenText Information Management

According to Gartner, a digital transformation includes information technology modernization, adoption of cloud computing, … The post Past, present and future in a digital transformation journey appeared first on OpenText Blogs. The objective is often tied to cost leadership, increased competitiveness or simply moving into a niche.

article thumbnail

Best Practices Q&A: Guidance about what directors need to hear from CISOs — from a board member

The Last Watchdog

She serves on the board of several technology companies and also happens to be steeped in cyber risk governance. Thus, presenting a sky-is-falling scenario to justify a fatter security budget, “does not resonate at the board level,” she said in her talk. Here’s that exchange, edited for clarity and length.

article thumbnail

Russia’s watchdog Roskomnadzor threatens to fine Twitter and Facebook

Security Affairs

” Russia’s Roskomnadzor revealed that the proceedings protocol was signed in the presence of a representative of Twitter, while no Facebook representative was present to sign it. The Russian government has already blocked the p rofessional social network L inkedIn in 2016 under the data-localization legislation.

Mining 173