article thumbnail

Ransomware en masse on the wane: top threats inside web-phishing in H1 2020

Security Affairs

CERT-GIB’s report is based on data collected and analyzed by the Threat Detection System (TDS) Polygon as part of operations to prevent and detect threats distributed online in H1 2020. SecurityAffairs – hacking, ransomware). Opened email lets spy in. Pierluigi Paganini.

Phishing 103
article thumbnail

Two hacker groups attacked Russian banks posing as the Central Bank of Russia

Security Affairs

Information and indicators of attack (IoAs) from 23 October and 15 November attacks were quickly uploaded to Group-IB Threat Intelligence, which allowed to warn Group-IB clients among Russian banks about the potential threat. Group-IB system blocked this threat in inline mode. . years of silent operations”.

Banking 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Security Affairs

CERT-GIB’s report is based on data collected and analyzed by the Threat Detection System (TDS) Polygon as part of operations to prevent and detect threats distributed online in H1 2019 in more than 60 countries. More than 80% of all malicious files were disguised as .zip rar archive files. Dangerous email.

article thumbnail

Top 5 Application Security Tools & Software for 2023

eSecurity Planet

Threat intelligence integration: Threat intelligence integrations enhance threat detection and provide real-time insights into emerging threats, including attack techniques and open source vulnerabilities, information that can help both dev and security teams.

Software 103
article thumbnail

Explaining User and Entity Behavior Analytics: Enhanced Cybersecurity Through UEBA

CyberSecurity Insiders

For this reason, UEBA works particularly well as an automated early threat detection system. UEBA can be characterized by its application of machine learning techniques and algorithms in detecting cyberattacks. Data Presentation. Detect compromised accounts.