Business of Sending Spam While malicious actors have developed countless attack methods, spam remains to this day a significant threat vector for companies. The most recent statistics on spam are indicative of the danger that spam poses: 95% of all … Read More
Illicit markets insider
What kind of data could your PDF files be leaking online?
What kind of data could your PDF files be leaking online? In the 2003 timeframe leading up to the Iraq war, a British government representative published a Word document on their website, containing information related to “Iraq’s security and intelligence … Read More
All Is Fair In Darknet Wars
All Is Fair In Darknet Wars For anyone trying to collect data on the darknet, the last three years have been an incredible challenge. The dark net used to be a collection of simple marketplaces that could be easily indexed … Read More
How online learning may have opened the door for ransomware in higher ed
How Online Learning May Have Opened the Door for Ransomware in Higher Ed PYSA ransomware, a variant of Mespinoza ransomware, has been actively targeting the education sector in the past months. According to the FBI, ransomware, malware and DDoS attacks … Read More
F.B.I. Reveals 70% Year-Over-Year Increase in Reported Cybercrime
F.B.I. Reveals 70% Year-Over-Year Increase in Reported Cybercrime The F.B.I. has just published its latest report on cybercrime complaints it received in 2020. The picture drawn should raise concerns for most CISOs, and unfortunately raises even more questions than providing … Read More
Renting A Canadian Bot for Less than the Price of Dinner for Two
Renting A Canadian Bot for Less than the Price of Dinner for Two A botnet is a network of computers infected with malware that allows a malicious actor – the botmaster – to control them remotely. The infected computers – … Read More
How Long Have You Thought about Backup Management this Month?
How Long Have You Thought about Backup Management this Month? We all know we should have backups. It’s not a task we particularly love doing, and it is definitely something that we forget to do unless automated. How many people … Read More
The Criminal Underground: the Last Refuge of Banner Ads
The Criminal Underground: the Last Refuge of Banner Ads In the 2000s, banner ads became popular notably through Google. The search engine has enabled marketers to reach a vast audience through a standard visual message that fit on any web … Read More
The Mirage of Encrypted Phones, and Why They Fail
The Mirage of Encrypted Phones, and Why They Fail In June 2014, the company Silent Circle launched the first version of its Blackphone. This device, running a modified version of Android, promised to reign in difficult to understand privacy and … Read More
5 Dark Web Questions Security Professionals Need Answered
5 Dark Web Questions Security Professionals Need Answered We recently participated in Datavore conference where we reflected on our 9 years of experience in collecting intelligence on the dark web and monitoring malicious actors. Over the years, the tools, strategies … Read More