Supply Chain Cyberattacks Surged 200% in 2017
Dark Reading
MARCH 22, 2018
Symantec's annual Internet Security Threat Report also shows that zero-day exploits fizzled and cryptocurrency mining exploded.
Dark Reading
MARCH 22, 2018
Symantec's annual Internet Security Threat Report also shows that zero-day exploits fizzled and cryptocurrency mining exploded.
Security Affairs
JULY 2, 2023
WordPress sites using the Ultimate Member plugin are under attack LockBit gang demands a $70 million ransom to the semiconductor manufacturing giant TSMC Avast released a free decryptor for the Windows version of the Akira ransomware Iran-linked Charming Kitten APT enhanced its POWERSTAR Backdoor miniOrange’s WordPress Social Login and Register plugin (..)
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
SecureList
MARCH 29, 2023
Meanwhile, cryptocurrency became a prominent target for those seeking monetary gain. The amount of cryptocurrency-related phishing grew significantly in 2022, and with an endless array of new coins, NFT and other DeFi projects, scammers are continuously duping users. Now we see that APT actors have also switched to crypto.
SecureList
FEBRUARY 23, 2022
This report aims to offer thorough insights into the financial cyberthreat landscape in 2021. The research in this report is a continuation of our previous annual financial threat reports ( 2018 , 2019 and 2020 ), providing an overview of the latest trends and key events across the threat landscape.
Thales Cloud Protection & Licensing
SEPTEMBER 5, 2019
This dual premise and promise is reflected in our Data Threat Report-Europe Edition – with over a third (36%) of enterprises stating they are now aggressively disrupting the markets they participate in through a digital transformation project or embedding digital capabilities that enable greater organisational agility.
Cisco Security
MARCH 11, 2021
The fact is that different threat types require varying amounts of internet connectivity in order to carry out their malicious activities. Then we’ll drill further into the data, looking at trends for particular threats that are known to work together. So, while one threat corrals more endpoints, the other is much busier.
SecureList
SEPTEMBER 6, 2022
Its main stealer functionality involves extracting data such as passwords, cookies, card details, and autofill data from browsers, cryptocurrency wallet secrets, credentials for VPN services, etc. Once a miner file is launched on an affected computer, it starts using the machine’s energy to mine cryptocurrency.
Let's personalize your content