Hollywood loves to portray hackers as wunderkinds with such exceptional cybercrime mojo that they can hack or crack anything. But as the AlphaBay takedown demonstrates, a simple mistake - reusing a Hotmail address - led to the administrator and site's arrest and downfall.
A deep dive into the takedowns of AlphaBay and Hansa, and their impact on the secretive illicit darknet marketplace, leads the latest edition of the ISMG Security Report. Also, a puzzling breach at Ricoh Australia.
Group-IB's unparalleled knowledge of Russian speaking cybercrime has been ranked among the top by IDC, Gartner, and Forrester.
Download the free Forrester report to learn more about the provider which meets your threat intel needs and avoid those that supply "fluff".
Inside also learn practical tips on building...
The FBI and Europol announced that they've jointly shuttered the world's two biggest darknet marketplaces, AlphaBay and Hansa, which were responsible for more than 10 times the volume of sales as the notorious Silk Road marketplace.
Two Iranian nationals remain at large after being charged by the U.S. Department of Justice with hacking into a Vermont-based engineering firm and stealing software used to develop projectiles, ranging from bullets to GPS-guided artillery shells and missiles.
The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities.
Download this whitepaper that provides a course correction for the industry by clearly delineating the offerings of 30 vendors that provide...
Dow Jones is blaming user error for an Amazon Web Services S3 bucket misconfiguration that exposed data on about 2.2 million customers. In recent months, Verizon, WWE, Scottrade and a data analytics firm aligned with the Republican Party have been similarly caught out.
Many organizations are at a disadvantage when they come up against today's cyber criminals. On one side are the criminals: sophisticated, well-funded, adaptive - always looking for new tools, techniques, procedures, and vectors to breach networks. On the other side are the defenders, hampered by legacy security...
Malware attacks are increasing, including ransomware like CryptoLocker, Locky, and zCrypt.
Businesses know it's essential to protect PCs from malicious programs, but many don't realize the value of server-level protection until the damage is done. Server-level protection from viruses and malware is essential, and...
Give the right users access to the right resources at the right times and for the right purposes.
Two-thirds of businesses have experienced data theft or corruption that originated within their organizations. But insider threats are difficult to control because your IBM i users need at least some level of access to...
Your users connect from many locations and devices. They no longer need the VPN to get work done. What if you had a fast, easy way to protect users anywhere they access the internet?
View this report that provides the 1st line of defense against threats on the internet.
44% of Security alerts aren't investigated
22% lost customers because of attacks
29% lost revenue as a result of attacks
What are you doing to stay secure in an expanding threat landscape?
View this report to see how your current security posture stacks up.
Email Phishing is one of the most common ways of delivering Ransomware and over 8% of your spams are Malicious. Protect against advanced email threats.
Read this report to learn how to protects against ransomware, business email compromise, spoofing, and phishing.
Whether you choose to move to a private, public, or hybrid cloud model, it comes with an inherent loss of network visibility. And unfortunately, you can't secure what you can't see.
Cisco with its selected partners offers to conduct a free of cost quick analysis of your network. Get your report.
The Question is WHEN? Here are some sobering facts:
54% of breaches remain undiscovered for months;
60% of an organization's data is stolen within hours of an attack.
So what can you do about it?
Learn how to Control Advanced Malware with More Visibility.