article thumbnail

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

The Last Watchdog

Hudson: You can somebody to click on a website, using a falsified machine identity, and then download them some ransomware, or put keystroke stealer, or any kind of information harvesting malware. Machine identities are foundational in our digital transformation, because everything that’s going onto the Internet is all built on machines.

Marketing 133
article thumbnail

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

The Last Watchdog

Threat actors simply seek out the endless fresh attack vectors arising as an unintended consequence of digital transformation. Over the past couple of years, CyCognito’s botnet has surveilled and fingerprinted some 3.5 Today we’re in the throes of digital transformation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

Related: The state of ransomware Who knew that much the same thing routinely happens to enterprises? ExtraHop’s finding vividly shows how, as digital transformation ramps up, companies really have no clue what moves back and forth, nor in and out, of their networks on a daily basis. But there is a larger lesson here.

article thumbnail

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

The Last Watchdog

Learning about how hackers were able to intercept drone feed video from CIA observation drones during the war in Iraq, for instance, tells us a lot about how tenuous sophisticated surveillance technology really can be, out in the Internet wild. I had the chance to interview Cunningham about the big takeaways he hopes Cyber Warfare imparts.

Passwords 149