Remove en we-live-progress
article thumbnail

Moving Connected Device Security Standards Forward

Google Security

Posted by Eugene Liderman, Director of Mobile Security Strategy, Google As Mobile World Congress approaches, we have the opportunity to have deep and meaningful conversations across the industry about the present and future of connected device security.

IoT 77
article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

Having been in the field for so long, we have witnessed some major changes in the cybercrime world’s modus operandi. We overview what kind of attacks are now carried out by cybercriminals and what influenced this change — including such factors as changes in vulnerability market and browser safety. Incident analysis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges

SecureList

In late August 2020, we published an overview of DeathStalker’s profile and malicious activities, including their Janicab, Evilnum and PowerSing campaigns ( PowerPepper was later documented in 2020). Meanwhile, in August 2020, we also released a private report on VileRAT to our threat intelligence customers for the first time.

article thumbnail

Main phishing and scamming trends and techniques

SecureList

As time progressed, online fraud became ever more sophisticated and persuasive. This report examines the main phishing trends, methods, and techniques that are live in 2022. For posting comments en masse, cybercriminals can use bots. We talked in detail about obfuscation methods in our post about the phishing-kit market.

Scams 94
article thumbnail

Detecting Credential Stealing Attacks Through Active In-Network Defense

McAfee

Over the course of this paper, we will discuss some of the widely adapted credential theft attacks executed by adversaries after the initial compromise and then move on to discuss defense techniques against the above MITRE Shield attacks and how to use them effectively to detect deceptive credential usage in the network. Reconnaissance.

article thumbnail

Political Milestones for AI

Schneier on Security

ChatGPT was released just nine months ago, and we are still learning how it will affect our daily lives, our careers, and even our systems of self-governance. We’re on the lookout for foreign governments that spread misinformation because we were traumatized by the 2016 US presidential election.