Exploits/Vulnerability

Protecting Your Business-Critical Data From Insider Threats

Protecting Your Business-Critical Data From Insider Threats Although today’s technology-driven era has made information sharing and data access very efficient, it has brought forth a new set of challenges. One of the primary challenges businesses face is the rising threat to data security. However, the threat to business data does not always come from external […]

Protecting Your Business-Critical Data From Insider Threats Read More »

Are You Aware of the Digital Risks to Your Business?

Rapid technological advancement and rising global connectivity are reshaping the way the world is functioning. From higher productivity to improved customer satisfaction, technology has played a critical role in the growth of businesses across the world. However, the consequential bad news is that technological advancements have also made organizations increasingly vulnerable to digital risks. However,

Are You Aware of the Digital Risks to Your Business? Read More »

RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom

RESEARCH & INTELLIGENCE / 11.02.22 / The BlackBerry Research & Intelligence Team The threat actor known as RomCom is running a series of new attack campaigns that take advantage of the brand power of SolarWinds, KeePass, and PDF Technologies. The BlackBerry Threat Research and Intelligence Team uncovered the campaigns while analyzing network artifacts unearthed during our recent report on

RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom Read More »

Recovery scammers target existing scam victims for second round

Posted: November 7, 2022 by Christopher Boyd These days, it pays to be on your guard for something referred to as a recovery scam. This is an increasingly popular technique which is absolutely rampant on certain quarters of social media. You may well have seen it yourself, without realizing. Either way, it’s quite the menace and essentially involves

Recovery scammers target existing scam victims for second round Read More »

How Insiders Pose a Serious Threat to Your Business-Critical Data

Merely mitigating external cybersecurity threats isn’t enough to fight cybercrime in today’s ever-evolving threat landscape. Although insider threats can be just as devastating as their external counterparts, most businesses fail to track and manage insider threats adequately. Human error and malicious insider threat behavior are involved in the majority of breaches. In light of this,

How Insiders Pose a Serious Threat to Your Business-Critical Data Read More »

Raspberry Robin worm used as ransomware prelude

Posted: October 31, 2022 by Pieter Arntz Raspberry Robin aka Worm. RaspberyRobin  started out as an annoying, yet relatively low-profile threat that was often installed via USB drive. First spotted in September 2021, it was typically introduced into a network through infected removable drives, often USB devices. Now the worm has been found to be the foothold for more serious threats

Raspberry Robin worm used as ransomware prelude Read More »

Fake Proof-of-Concepts used to lure security professionals

Posted: October 27, 2022 by Pieter Arntz Researchers from the Leiden University published a paper detailing how cybercriminals are using fake Proof-of-Concepts (PoCs) to install malware on researchers’ systems. The researchers found these fake PoCs on a platform where security professionals would usually expect to find them—the public code repository GitHub. Use of PoCs There is a big difference between

Fake Proof-of-Concepts used to lure security professionals Read More »

Ransomware Equals a Data Breach

From a data regulator’s perspective, it is the responsibility of your business to keep data safe from cyberthreats, inform clients about a breach within a stipulated period and provide necessary documentation as proof of your efforts. Although different regulations have laid down distinct mandates for breach notifications, the principle remains intact. While there is an

Ransomware Equals a Data Breach Read More »

What is ransomware-as-a-service and how is it evolving?

Posted: October 27, 2022 by Bill Cozens Ransomware attacks are becoming more frequent and costlier—breaches caused by ransomware grew 41 percent in the last year, the average cost of a destructive attack rising to $5.12 milllion. What’s more, a good chunk of the cyber criminals doing these attacks operate on a ransomware-as-a-service (RaaS) model. RaaS is not much different, in theory,

What is ransomware-as-a-service and how is it evolving? Read More »