article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The epidemic went truly mainstream with the release of CryptoLocker back in 2013, and it has since transformed into a major dark web economy spawning the likes of Sodinokibi, Ryuk, and Maze lineages that are targeting the enterprise on a huge scale in 2020. FBI spoofs 2012 – 2013. File encryption 2013 – 2015. About the essayist.

article thumbnail

Cybercrime Year in Review: 2013

SiteLock

In its annual Data Breach Investigations Report , published at the beginning of 2013, Verizon revealed that businesses with fewer than 100 employees made up the single largest group of victims of data breaches. And if you think that simply relying on antivirus software will get you through safely, there’s some more bad news.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

eSecurity Planet’s 2022 Cybersecurity Product Awards

eSecurity Planet

Best Cybersecurity Solutions : Overall Vendor Top Startup EDR Firewall SIEM Intrusion Detection Breach and Attack Simulation Encryption Small Business Security Email Security IAM NAC Vulnerability Management Security Awareness Training. Top Cybersecurity Startup: Abnormal Security. Winner : Abnormal Security.

article thumbnail

Point-of-Sale (POS) Security Measures for 2021

eSecurity Planet

vSkimmer malware, a successor to Dexter, dates back to 2013. Backoff malware, which also dates back to 2013, scrapes memory for track data, logs keystrokes, and connects to a command and control server to upload stolen data and download additional malware. ” For more, see Designing Employee Security Awareness Training That Works.

Retail 52
article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

One of the most notorious one being the BlackPOS spyware that compromised the data of over 40 million Target customers in 2013. Computer viruses often utilize deception techniques and keep evolving to evade antivirus software. Ransomware. Email attachments are the top vector leading to virus infections. Computer worms.

article thumbnail

6 Dangerous Microsoft Office 365 Security Concerns for Business

Spinone

Using Outdated Software – companies pay about $36 295 to return their data from hacker By “software” we mean using old versions of Office like Office 2007 / 2010 / 2013 and not checking for the system updates and patches in Office 365. If you are guilty of it too, be ready for some security repercussions.

article thumbnail

The Most Common Types of Malware in 2021

CyberSecurity Insiders

One of the most notorious one being the BlackPOS spyware that compromised the data of over 40 million Target customers in 2013. Computer viruses often utilize deception techniques and keep evolving to evade antivirus software. Ransomware. Email attachments are the top vector leading to virus infections. Computer Worms.

Malware 107