Sextortion scammers getting creative

Credit to Author: William Tsing| Date: Tue, 26 Nov 2019 17:09:34 +0000

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Categories:

Tags:

(Read more…)

The post Sextortion scammers getting creative appeared first on Malwarebytes Labs.

Read more

3 Ways for MSPs to Increase Their Managed Security Footprint

Credit to Author: Trend Micro| Date: Fri, 25 Oct 2019 18:05:35 +0000

Managed service providers looking to increase their business often face the choice of whether to focus on finding new customers or expanding their existing base. But there’s a growing opportunity making the latter option especially appealing. The small and midsize businesses that comprise the bulk of the MSP customer base have a limited understanding of…

The post 3 Ways for MSPs to Increase Their Managed Security Footprint appeared first on .

Read more

Darknet hosting provider in underground NATO bunker busted

Credit to Author: Lisa Vaas| Date: Tue, 01 Oct 2019 09:41:45 +0000

Police overcame not only digital defenses of the “bulletproof” provider CyberBunker but also barbed wire fences and surveillance cams.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/mdF0Y34b2RU” height=”1″ width=”1″ alt=””/>

Read more

Darknet hosting provider busted in underground NATO bunker

Credit to Author: Lisa Vaas| Date: Tue, 01 Oct 2019 09:41:45 +0000

Police overcame not only digital defenses of the “bulletproof” provider CyberBunker but also barbed wire fences and surveillance cams.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/mdF0Y34b2RU” height=”1″ width=”1″ alt=””/>

Read more

Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more