Intelligence 08/May/2020 Double Extortion: Data leak combined with ransomware have increased in recent weeks Criminals use various techniques to extract sensitive data and sabotage the environment, requiring payment to prevent leaks
Intelligence 18/October/2017 HydraPOS — Operation of Brazilian fraudsters has accumulated, at least, 1.4 million card data Fraud scheme went unnoticed for four years, targeting several merchants in Brazil
Uncategorized 23/June/2017 Data leakage is the theme of El Pescador’s new simulated phishing campaign Cyber threats are constantly being renewed as cybercriminals develop increasingly sophisticated techniques to achieve their goals
Uncategorized 26/May/2017 A time bomb: the challenge to fight fraud in the digital advertising industry The HummingBad is one among the various activities that continually harm the digital advertising industry
Uncategorized 26/May/2017 Increase in ‘CEO Fraud’ attacks highlights risks to corporate environments The number of BEC (Business Email Compromise) attacks has grown about 55% in 2015 in comparison with the previous year
Uncategorized 26/May/2017 Malvertising — recent developments on tactics and techniques Performing Malvertising attacks has already become an established technique in the modus operandi of several cyber crime rings
Uncategorized 26/May/2017 Exploit Kits: The current revival of an old tool that became trend The first campaign that used an EK was spotted a decade ago and it used code that exploited a ‘0-day’ vulnerability in Internet Explorer
Intelligence 08/May/2020 Double Extortion: Data leak combined with ransomware have increased in recent weeks Criminals use various techniques to extract sensitive data and sabotage the environment, requiring payment to prevent leaks
Intelligence 18/October/2017 HydraPOS — Operation of Brazilian fraudsters has accumulated, at least, 1.4 million card data Fraud scheme went unnoticed for four years, targeting several merchants in Brazil
Uncategorized 23/June/2017 Data leakage is the theme of El Pescador’s new simulated phishing campaign Cyber threats are constantly being renewed as cybercriminals develop increasingly sophisticated techniques to achieve their goals
Uncategorized 26/May/2017 A time bomb: the challenge to fight fraud in the digital advertising industry The HummingBad is one among the various activities that continually harm the digital advertising industry
Uncategorized 26/May/2017 Increase in ‘CEO Fraud’ attacks highlights risks to corporate environments The number of BEC (Business Email Compromise) attacks has grown about 55% in 2015 in comparison with the previous year
Uncategorized 26/May/2017 Malvertising — recent developments on tactics and techniques Performing Malvertising attacks has already become an established technique in the modus operandi of several cyber crime rings
Uncategorized 26/May/2017 Exploit Kits: The current revival of an old tool that became trend The first campaign that used an EK was spotted a decade ago and it used code that exploited a ‘0-day’ vulnerability in Internet Explorer