cybercriminals
Spammers adapt and embrace popular themes
According to Kaspersky Lab, the percentage of spam in email traffic in June was up 1.4 percentage points and averaged at 71.1 per cent. Malicious attachments were found in 1.8 …
DDoS attack size growing dramatically
Arbor Networks released data on DDoS attack trends for the first half of 2013. The data shows that DDoS continues to be a global threat, with a clear increase in attack size, …
FTC crackdown on “free gift card” scammers
The FTC has moved to shut down an international network of scammers that sent millions of unwanted text messages to consumers, using the lure of “free” gift cards …
Sharp increase in blended, automated attacks
FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to …
TOR-based botnets on the rise
Keeping their botnet’s C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified. But given that cyber …
A historical overview of the cyberattack landscape
Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially. …
Bogus AmEx notification leads to thorough phishing
American Express-themed phishing emails are never out of circulation, but it pays to know which new (or recycled) angle is being used at the moment. The latest one to hit …
Bogus “Royal Baby: Live Updates” email leads to malware
As expected, news of the new birth in the British Royal Family has become a perfect lure in malware delivery schemes. ThreatTrack has spotted an email titled “The Royal …
Syrian hackers hit Tango, The Daily Dot
Pro-Assad hacker group the Syrian Electronic Army claims to have breached the back-up database of Tango, the company behind the popular eponymous app, and to have exfiltrated …
HTML ransomware goes global
Last week we saw that a ransomware scheme does not need to involve actual malware, as clever cyber crooks leveraged browsers’ “restore from crash” feature to …
U.S. the number one source of web attacks
Retailers suffer twice as many SQL injection attacks as other industries, according to Imperva. Additionally, these attacks were more intense, both in terms of number of …
Combat Arms players, beware of free NX generators
Players of the popular Combat Arms first-person shooter are being targeted by online crooks via the in-game chat system, warns Chris Boyd. They crooks offer what is supposedly …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?