article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

C-suites across all industries, from traditional finance to the latest “unicorns” emerging in the fintech industry, are facing a formidable challenge: how to protect their business and customer data against growing cyber threats. As a CISO or ITDM, the cyber defence challenges you face in your business couldn’t be tougher.

CISO 147
article thumbnail

FBI Dismantles Qakbot Botnet in Landmark Cyber Op

SecureWorld News

The significance of this achievement cannot be overstated, as Qakbot has been responsible for a myriad of cybercrimes, including ransomware attacks and financial fraud, causing massive losses to individuals and businesses for more than a decade. What is Qakbot and why was it shutdown?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Global Cyber Threats Persistent as Bad Actor Motivations Evolve

SecureWorld News

We collected the most data ever from 87 organizations that were victims of cyberattacks, and between the original report in 2008 and this year, the biggest shift we' ve seen is the growing importance of end-users whom bad actors prey on for system access. Our new report shows some enduring themes—and a few new ones, as well.

article thumbnail

FBI: Operation ‘Duck Hunt’ dismantled the Qakbot botnet

Security Affairs

’ Qakbot , also known as QBot, QuackBot and Pinkslipbot, is an info-stealing malware that has been active since 2008. ” “All of this was made possible by the dedicated work of FBI Los Angeles, our Cyber Division at FBI Headquarters, and our partners, both here at home and overseas,” added Wray.

Malware 85
article thumbnail

Growing Cyber Threats to the Energy and Industrial Sectors

NopSec

SCADA Access As A Service (SAaaS) Cybercrime is a business. In 2008, the United States Department of Defence was compromised by an unknown foreign intelligence agency when an employee inserted a compromised USB flash drive into a government laptop computer. More often, though, it is spread indiscriminately via spam networks.

article thumbnail

History of Computer Hacking and Cybersecurity Threats: From the 50s to Today

ForAllSecure

Understanding the history of computer hacking is important for understanding its impact on technology and society, the current state of cybersecurity, and for developing effective strategies for protecting against cyber threats. The early 2000s also saw the emergence of new forms of cybercrime, such as phishing and malware attacks.

Hacking 75
article thumbnail

Indicators of compromise (IOCs): how we collect and use them

SecureList

What is cyber threat intelligence, and how do we use it in GReAT? This is what we call cyber threat intelligence. It also requires a large and representative set of knowledge about cyberattacks, threat actors and associated tools over an extended timeframe. But why are we offering cyber threat intelligence at all?