Account takeover: Are you opening the door for cyber threat actors?
In 2020, our research report on account takeover (ATO) highlighted the risk of using credentials in an unsafe manner, which ...
The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime
You’d have to have been living under a rock to have avoided the excitement surrounding Non-Fungible-Tokens (NFTs) in the last ...
The Account Takeover Kill Chain: A Five Step Analysis
Here, we review account takeover from the perspective of the cybercriminal: why and how do cybercriminals perform ATO?
7 Tips for Protecting Against Account Takeovers
In May 2017, an amalgamation of over 1 billion credentials was uploaded to the Have I Been Pwned database. One ...
7.5M Adobe Creative Cloud User Records Exposed, City Of Joburg Ransomware Attack, and APT28 Updates
Adam Cook, Philip Doherty, and Viktoria Austin host this week’s ShadowTalk update around an unsecured Elasticsearch database exposing account information of aboutt 7.5 million Adobe Creative Cloud...
Honeypots: Tracking Attacks Against Misconfigured or Exposed Services
Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of ...
Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat
Cybercriminal Forum Developments: Escrow Services
On Russian- and English-language cybercriminal forums on the clear and dark web, vendors are increasingly asking interested buyers to place money in a forum escrow service before they will provide fur
Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence
We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories.
- APT35 Targets Email of US political figures & prominent Iranians
Episode 39: Credential Hygiene
Dr. Richard Gold and Simon Hall join Rafael Amado to discuss the age-old problem of credential hygiene. We’ve all heard of not reusing passwords, employing two factor authentication and using...
33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy
Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...