Remove Honeypots Remove Mining Remove Phishing
article thumbnail

Top Deception Tools for 2022

eSecurity Planet

From bank transfer cons to CEO fraud to elaborate phishing and spear phishing campaigns, cyber criminals have been quick to use deception as a major means of infiltrating networks and systems, and for remaining undetected while inside. But it can work the other way. Key Differentiators.

Cloud 132
article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

They do like crypto mining and containers and stuff. So seems relatively benign, but one thing a lot of people don't realize is that they have a detection for crypto mining and they'll just destroy the system. But one thing this group does with their core team TNT, by the way, is they actually still have some Cloud credentials.

Cloud 40
article thumbnail

Security Affairs newsletter Round 492 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

National Charged with Multimillion-Dollar Hack-to-Trade Fraud Scheme Crooked Cops, Stolen Laptops & the Ghost of UGNazi Investigating Infrastructure and Tactics of Phishing-as-a-Service Platform Sniper Dz Police arrest four suspects linked to LockBit ransomware gang How the FBI and Mandiant caught a ‘serial hacker’ who tried to fake his own death (..)

Security 292