article thumbnail

Supply Chain Cyberattacks Surged 200% in 2017

Dark Reading

Symantec's annual Internet Security Threat Report also shows that zero-day exploits fizzled and cryptocurrency mining exploded.

article thumbnail

Security Affairs newsletter Round 426 by Pierluigi Paganini – International edition

Security Affairs

WordPress sites using the Ultimate Member plugin are under attack LockBit gang demands a $70 million ransom to the semiconductor manufacturing giant TSMC Avast released a free decryptor for the Windows version of the Akira ransomware Iran-linked Charming Kitten APT enhanced its POWERSTAR Backdoor miniOrange’s WordPress Social Login and Register plugin (..)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Financial cyberthreats in 2022

SecureList

Meanwhile, cryptocurrency became a prominent target for those seeking monetary gain. The amount of cryptocurrency-related phishing grew significantly in 2022, and with an endless array of new coins, NFT and other DeFi projects, scammers are continuously duping users. Now we see that APT actors have also switched to crypto.

Banking 79
article thumbnail

Financial cyberthreats in 2021

SecureList

This report aims to offer thorough insights into the financial cyberthreat landscape in 2021. The research in this report is a continuation of our previous annual financial threat reports ( 2018 , 2019 and 2020 ), providing an overview of the latest trends and key events across the threat landscape.

Banking 107
article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

This dual premise and promise is reflected in our Data Threat Report-Europe Edition – with over a third (36%) of enterprises stating they are now aggressively disrupting the markets they participate in through a digital transformation project or embedding digital capabilities that enable greater organisational agility.

article thumbnail

Threat Trends: DNS Security, Part 1

Cisco Security

The fact is that different threat types require varying amounts of internet connectivity in order to carry out their malicious activities. Then we’ll drill further into the data, looking at trends for particular threats that are known to work together. So, while one threat corrals more endpoints, the other is much busier.

DNS 140
article thumbnail

Good game, well played: an overview of gaming-related cyberthreats in 2022

SecureList

Its main stealer functionality involves extracting data such as passwords, cookies, card details, and autofill data from browsers, cryptocurrency wallet secrets, credentials for VPN services, etc. Once a miner file is launched on an affected computer, it starts using the machine’s energy to mine cryptocurrency.

Mobile 109