intgr8r

RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom

RESEARCH & INTELLIGENCE / 11.02.22 / The BlackBerry Research & Intelligence Team The threat actor known as RomCom is running a series of new attack campaigns that take advantage of the brand power of SolarWinds, KeePass, and PDF Technologies. The BlackBerry Threat Research and Intelligence Team uncovered the campaigns while analyzing network artifacts unearthed during our recent report on […]

RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom Read More »

Recovery scammers target existing scam victims for second round

Posted: November 7, 2022 by Christopher Boyd These days, it pays to be on your guard for something referred to as a recovery scam. This is an increasingly popular technique which is absolutely rampant on certain quarters of social media. You may well have seen it yourself, without realizing. Either way, it’s quite the menace and essentially involves

Recovery scammers target existing scam victims for second round Read More »

Instagram scammer pleads guilty to money laundering, wire fraud, and wire fraud conspiracy

Posted: November 7, 2022 by Christopher Boyd The risks and rewards of getting up to no good on social media have been thrown into sharp focus, with news of a guilty plea in a case wrapped up in alleged wire fraud and “influencing”. 27 year old Jebara Igbara, known as “Jay Manzini” on Instagram where he has a

Instagram scammer pleads guilty to money laundering, wire fraud, and wire fraud conspiracy Read More »

Why Smart Tech Acceleration is Essential to Long-Term Business Growth

In your attempt to adapt to the evolving technology landscape and the onset of the COVID-19 pandemic, have you invested in solutions that may not be assisting your company in achieving its long-term goals? If so, you’re not alone. The rapid growth of technology shows no signs of slowing, and businesses have gradually begun to

Why Smart Tech Acceleration is Essential to Long-Term Business Growth Read More »

How Insiders Pose a Serious Threat to Your Business-Critical Data

Merely mitigating external cybersecurity threats isn’t enough to fight cybercrime in today’s ever-evolving threat landscape. Although insider threats can be just as devastating as their external counterparts, most businesses fail to track and manage insider threats adequately. Human error and malicious insider threat behavior are involved in the majority of breaches. In light of this,

How Insiders Pose a Serious Threat to Your Business-Critical Data Read More »

Raspberry Robin worm used as ransomware prelude

Posted: October 31, 2022 by Pieter Arntz Raspberry Robin aka Worm. RaspberyRobin  started out as an annoying, yet relatively low-profile threat that was often installed via USB drive. First spotted in September 2021, it was typically introduced into a network through infected removable drives, often USB devices. Now the worm has been found to be the foothold for more serious threats

Raspberry Robin worm used as ransomware prelude Read More »

LinkedIn introduces new security features to combat fake accounts

Posted: November 1, 2022 by Malwarebytes Labs LinkedIn knows it has a problem with bots and fake accounts, and has acknowledged this on more than one occasion. For years, it has been aware of spam, fake job offers, phishing, fraudulent investments, and (at times) malware, and has been trying to combat those issues. In 2018, LinkedIn rolled out a way to automatically

LinkedIn introduces new security features to combat fake accounts Read More »

Protecting Your Business-Critical Data From Insider Threats

Although today’s technology-driven era has made information sharing and data access very efficient, it has brought forth a new set of challenges. One of the primary challenges businesses face is the rising threat to data security. However, the threat to business data does not always come from external actors. Worryingly, the greatest threat to business-critical

Protecting Your Business-Critical Data From Insider Threats Read More »