U.S. Capitol Riots: What May Happen After the Physical Penetration of A Network

capitol attack cyber security

Recent events at the Capitol in Washington D.C. were condemned for their impact on the democracy of the United States. What was much less discussed, however, is their impact on the integrity of U.S. government networks and databases. Data Breach Today reported this week that: Computers in [Speaker of the House] Nancy Pelosi’s office were […]

Our Take on the Top 5 Predictions for 2021

cyber trends 2021

Every December, analysts make predictions about the key events in the following months. These lists range from the most obvious (ex. ransomware will be a big risk in the next 12 months) to the most industry insider (ex. investments in endpoint security cloud services from Europe precisely will grow by 2.4%), which may be of […]

What do fraudsters want for Christmas in 2020?

‘Tis the season to be jolly, even though this year has been a challenge, to say the least. While some are thinking about end of year reports and others are looking ahead for a hopeful 2021, fraudsters remain active on dark web marketplaces. What is the criminal underground doing this holiday season?  Our team investigated […]

Government Source Code Leaks Compromise the Personal Data of Millions

brazil data leak

It’s not always security researchers who uncover major data breaches or security mishaps. Reporters from a Brazilian publication have been very good lately at detecting unfortunate incidents generated by official government websites or careless government employees. It appears that for about six months, a database which has been gathering personal information for about 30 years, […]

When Private Photos Don’t Stay Private for Long

When Private Photos Don't Stay Private For Long

It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content  benefits from end-to-end encryption, making it nearly impossible to snoop on. In privacy wars, Apple has a proven track record of providing  a much more secure environment […]

How Do Company Secrets Get Leaked Online?

secret leak

Back in 2017, Facebook suffered a source code leak, initially believed to have been the result of either a developer intentionally leaking it or a security loophole in company servers. The source code leak gave away critical information about the application’s structure and development practices, which ultimately raised some serious data privacy concerns. Once the […]

Hacker Contracts: The Economy Behind Illicit Markets

hackers contracts

Malicious actors often rely on each other to launch attacks. A carding ring that was recently dismantled by Russian authorities, for example, led to the arrest of 25 individuals who were working together. Browsing through a popular hacker forum, one can come across hundreds, if not thousands, of advertisements for different hacking tools and services. […]

The Winners and Losers of the Empire Market Shutdown

dark web markets

Updated: November 26th, 2021As the article below is a bit out of date, here’s a breakdown of most of the large changes in the dark web marketplace scene: Empire Market exit scammed in August 2020 DarkMarket was sized in January 2021 Yellow Brick exited a few days after DarkMarket BigBlue was seized by Interpol in April […]

Why all the Spam? How Phishing Emails Get to You

phishing spam example

A phishing attack is any communication (email, SMS, instant messaging) campaign launched by a malicious actor to steal personal data and credentials. Phishing attacks are one of the biggest threats to data security. According to a Microsoft report, the frequency of phishing attacks grew by 250% between 2018 and 2019. Phishing has now supplanted malware […]

Ransomware and Supply Chains

ransomware attack example

Ransomware is a growing threat to any organization, government or business. In Canada alone, it is estimated that ransomware attacks and the associated downtime cost our economy CAD$2.4 billion in 2020. HOW RANSOMWARE ATTACKS WORK Spread as malware through emails and insecure download links, ransomware programs embed themselves in the computer systems of firms. Ransomware […]