article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

Often, a scammer will simply target the people in a company and fool them into giving up their personal details, account passwords, and other sensitive information and gain access that way. since Q3 of 2007. However, the technological side of cybersecurity is no longer the weakest link in a company’s proverbial chain. Business targets.

article thumbnail

Weekly podcast: ICS attacks, Reddit and SIM swap arrests

IT Governance

A new report from Cybereason has highlighted the alarming scale and variety of attacks faced by ICS or industrial control systems, and it seems that it’s not only nation-state attackers but also opportunistic traditional cybercriminals that are now targeting utility providers. These included recipients’ usernames and email addresses.