Remove links-resources
article thumbnail

Group-IB Hi-Tech Crime Trends 2020/2021 report

Security Affairs

Group-IB , a global threat hunting and intelligence company, has presented its annual Hi-Tech Crime Trends 2020/2021 report. In the report, the company examines key shifts in the cybercrime world internationally between H2 2019 and H1 2020 and gives forecasts for the coming year.

article thumbnail

UNC2529, a new sophisticated cybercrime gang that targets U.S. orgs with 3 malware

Security Affairs

The attackers, who appear experienced and well resourced, employed custom lures and showed a professionally coding of their malware. FireEye’s Mandiant unit observed two distinct waves of attacks carried out by the cybercrime group in December 2020. UNC2529 is assessed as capable, professional and well resourced.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2024 State of Cybersecurity: Reports of More Threats & Prioritization Issues

eSecurity Planet

Read on for more details on these threats or jump down to see the linked vendor reports. CrowdStrike: Detected significant signs of credentials theft: 76% YoY increase in victims named on eCrime dedicated link sites. 13% maintain access to company tools or resources after leaving the organization.

article thumbnail

List of Data Breaches and Cyber Attacks in 2023

IT Governance

So, each month, we’ll update this page with the latest figures and links, so be sure to bookmark it to keep an eye out for the latest data breach news. We offer a variety of resources to help understand and mitigate threats, from training courses and consultancy services to free guides.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

In 2017, more than 300,000 WordPress websites were affected by a malicious plugin that allowed an attacker to place embedded hidden links on victim websites. With over 600,000 devices, this botnet exposed just how vulnerable IoT devices could be and led to the IoT Cybersecurity Improvement Act of 2020. Bots and Botnets. Phishing Type.

Phishing 104
article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

The CCPA goes into effect January 1, 2020. Below is a history of the CCPA, a summary of its key elements as adopted, including recently adopted technical amendments, and practical takeaways for covered entities as the law moves from passage to 2020 enforcement. Its final status, however, is far from clear. CCPA Background. 17-0039).

Privacy 58
article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

The CCPA goes into effect January 1, 2020. Below is a history of the CCPA, a summary of its key elements as adopted, including recently adopted technical amendments, and practical takeaways for covered entities as the law moves from passage to 2020 enforcement. Its final status, however, is far from clear. CCPA Background. 17-0039).

Privacy 58