article thumbnail

Threat Report Portugal: Q3 & Q4 2022

Security Affairs

The Threat Report Portugal: H2 2022 compiles data collected on the malicious campaigns that occurred from July to December, H2, 2022. The Portuguese Abuse Open Feed 0xSI_f33d is an open-sharing database with the ability to collect indicators from multiple sources, developed and maintained by Segurança-Informática.

article thumbnail

Ransomware Attacks: The Constant and Evolving Cybersecurity Threat

Thales Cloud Protection & Licensing

Ransomware Attacks: The Constant and Evolving Cybersecurity Threat madhav Tue, 03/12/2024 - 13:00 Enterprise data collection is skyrocketing, driven by factors like connected devices, cloud computing, personal data collection and digital transactions. It accounts for 25% of all data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Access Management is Essential for Strengthening OT Security

Thales Cloud Protection & Licensing

For example, an important finding from the Conti leak was the common reliance of ransomware threat actors on Active Directory for lateral movement within the network using privileged credentials. The alert detailed cyber threats which can lead to ransomware, data theft and disruption of healthcare services.

article thumbnail

Good game, well played: an overview of gaming-related cyberthreats in 2022

SecureList

One of the most outstanding examples involves $2 million ‘s worth of CS:GO skins stolen from a user’s account , which means that losses can get truly grave. Game over: cybercriminals targeting gamers’ accounts and money. Launching the malware resulted in decryption and activation of a Trojan-stealer dubbed Taurus.

Mobile 103
article thumbnail

Financial cyberthreats in 2022

SecureList

BlueNoroff developed an elaborate phishing campaign that targeted startups and distributed malware for stealing all crypto in the account tied to the device. The NaiveCopy campaign, another example of an advanced threat, targeted stock and cryptocurrency investors in South Korea. Now we see that APT actors have also switched to crypto.

Banking 76
article thumbnail

Operation Night Fury: Group-IB helps take down a cybergang behind the infection of hundreds of websites all over the world

Security Affairs

To access their servers for stolen data collection and their JS-sniffers’ control, they always used VPN to hide their real location and identity. According to Group-IB’s annual 2019 threat report, the number of compromised cards uploaded to underground forums increased from 27.1 million to 43.8