Remove Digital transformation Remove Ransomware Remove Surveillance Remove Technology
article thumbnail

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

The Last Watchdog

Threat actors simply seek out the endless fresh attack vectors arising as an unintended consequence of digital transformation. Over the past couple of years, CyCognito’s botnet has surveilled and fingerprinted some 3.5 Today we’re in the throes of digital transformation.

article thumbnail

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

The Last Watchdog

Learning about how hackers were able to intercept drone feed video from CIA observation drones during the war in Iraq, for instance, tells us a lot about how tenuous sophisticated surveillance technology really can be, out in the Internet wild. LW: What key technologies and processes will come into play?

Passwords 149
article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

Related: The state of ransomware Who knew that much the same thing routinely happens to enterprises? ExtraHop’s finding vividly shows how, as digital transformation ramps up, companies really have no clue what moves back and forth, nor in and out, of their networks on a daily basis. But there is a larger lesson here.