How online learning may have opened the door for ransomware in higher ed

higher ed ransomware

PYSA ransomware, a variant of Mespinoza ransomware, has been actively targeting the education sector in the past months. According to the FBI, ransomware, malware and DDoS attacks have compromised a number of critical sectors, yet educational institutions in the US and the UK seem to be the preferred target for now. Has online learning triggered […]

F.B.I. Reveals 70% Year-Over-Year Increase in Reported Cybercrime

cybercrime complaints 2020

The F.B.I. has just published its latest report on cybercrime complaints it received in 2020. The picture drawn should raise concerns for most CISOs, and unfortunately raises even more questions than providing answers. The main take-away from the report is that 791,790 cybercrime complaints were made in 2020. Those complaints were responsible for over US$4.2 […]

Renting A Canadian Bot for Less than the Price of Dinner for Two

renting a canadian bot

  A botnet is a network of computers infected with malware that allows a malicious actor – the botmaster – to control them remotely. The infected computers – the bots – communicate with a command and control server (C&C) to receive their orders. The use cases for bots are too numerous to list here, but […]

How Long Have You Thought about Backup Management this Month?

world backup day

We all know we should have backups. It’s not a task we particularly love doing, and it is definitely something that we forget to do unless automated. How many people religiously plugged in their iPhone in their computer to back it up a few years ago, when backups were not sent automatically to the cloud […]

The Criminal Underground: the Last Refuge of Banner Ads

banner ads dark web

In the 2000s, banner ads became popular notably through Google. The search engine has enabled marketers to reach a vast audience through a standard visual message that fit on any web page. Just like containers for shipping, banner ads were standardized to make it easier to share and post on multiple platforms. While useful for […]

The Mirage of Encrypted Phones, and Why They Fail

encrypted phones

In June 2014, the company Silent Circle launched the first version of its Blackphone. This device, running a modified version of Android, promised to reign in difficult to understand privacy and security settings to make it easy to communicate securely. Blackphone users were supposed to be able to make encrypted calls and send encrypted messages […]

5 Dark Web Questions Security Professionals Need Answered

datavore darkweb questions

We recently participated in Datavore conference where we reflected on our 9 years of experience in collecting intelligence on the dark web and monitoring malicious actors. Over the years, the tools, strategies and targets have changed considerably, and this walk down memory lane was an opportunity to gather our insights in how and why we […]

The Threat of Synthetic Identity Fraud for Businesses and Consumers

synthetic identities

Financial crimes have increased during the pandemic, with nearly 60% of companies reporting synthetic identity fraud attacks and account takeover in 2020. The Federal Reserve warns this is one of the most prevalent types of fraud in the U.S., actively targeting financial institutions such as banks and credit bureaus. In 2017, for instance, 1 million […]

The Ins and Outs of Illicit Chat Rooms

ICQ app illicit chatroom

Over the past decade, the dark web has attracted much of the attention in the security field as the premier source of threats for companies. Our years of monitoring the dark web have helped better understand what it is, and most importantly, is not. The dark web is host to many dynamic malicious actor communities. […]