Threat Update

Related categories

It has been reported that the Bank of the West learned that their debit card tracking numbers and Personal Identification Numbers were jeopardized by skimmers installed in multiple ATMs. Reports show that although it seems as if Magecart attacks are less prevalent, they're still present.
ZLoader was an effective trojan that was used to distribute and activate payloads, such as ransomware.  It is a banking trojan that is an improvement from Zeus.
There are three types of insider threats: damage that can be done to the Department through damage to the Department’s equipment, personal injury through physical violence, or destruction of information by a data breach.
A Discord virus can attach itself to computer while using the platform. The most common hack is a malicious code inserted into the client files. Once the files are downloaded, a person unknowingly executes the malware which can contain dangerous codes that harm their computer.
Sandworm is a prolific and notorious hacking group that has been active since at least 2012. The group is believed to be responsible for NotPetya malware outbreak in 2017. In recent months, the group has resurfaced with a new campaign targeting energy companies in the United States and Europe.
"Lapsus$" is a hacking gang that breaks into the accounts of high-profile executives and celebrities and then using their social media accounts to get mass media attention.
The Quantum Locker Ransomware gets into your computer by disguising itself as a legitimate update for Adobe Flash player. Once it is installed, it will encrypt all of your data and require you to pay ransom in Bitcoin. Your files will not be able to be accessed until this payment is made.
Emotet is an evil program that infects a computer and then uses it to send out spam or phishing emails to other people.
The purpose of cyberterrorism is to instill fear in a population by using computers and the internet to commit acts of violence.
Hive Ransomware uses an Advanced Encryption Standard (AES) algorithm, which is so strong that there are no decryption tools available at this time.

RECENT POSTS