article thumbnail

2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping

Webroot

Earlier in 2021, we detailed the hidden costs of ransomware in our eBook. Cryptocurrency. There was no shortage of discussion surrounding cryptocurrency and its security flaws. Consumers also remain at risk. Ransomware. Since mid-October 2021, there have been more than 25 active strains of ransomware circulating.

article thumbnail

Spam and phishing in 2023

SecureList

However, by buying something on an unverified site, the user risked both losing money and having their personal data, such as postal or email address, phone number, and other details, stolen. Cryptocurrency scams Phishing aimed at stealing crypto wallet credentials remained a common money-making tool.

Phishing 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

This is a scam that’s been around for years and since no one can reverse a cryptocurrency transaction, it’s very likely here to stay. With the increase of remote workers using unsecured systems and personal devices to access corporate networks, all businesses are at risk from opportunists who bait remote employees.

Scams 108
article thumbnail

Chinese fraudsters: evading detection and monetizing stolen credit card information

CyberSecurity Insiders

They change their IP addresses while maintaining a clean state and use multiple domain names to spread their risk, ensuring that they can continue phishing even if one domain is blocked. One method is to directly purchase cryptocurrency or gift cards through websites using stolen credit card information, which is popular for U.S.

article thumbnail

Q&A on the Future of Work

Cisco Security

That brings up an even higher level of risk. Firms need to ensure seamless remote collaboration, mitigate risk to the network, employees and data, and protect themselves from COVID exposed weaknesses to operations that may have been overlooked previously. Richard Archdeacon: Especially when employees have to use their own device.