Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Blog Category - Cyber Crime

Cyber Crime, Cyberattacks, Data & Cybersecurity, Hacking

Poker Credential Stuffing Attack

Automated brute force attacks, also known as automated threats, are growing increasingly sophisticated. The Open Web Application Security Project (OWASP) currently lists 21 different methods of automated threats used by cybercriminals to hack into user accounts, ranging from CAPTCHA Defeat,...

Read More
Cyber Crime, Cyber Risk, Data & Cybersecurity

Trends in Ransomware: What to Know About RaaS

By now we’ve all heard of SaaS (software as a service) and many have heard of IaaS (Infrastructure as a Service), PaaS (Platform as a Service), or the term that contains them all: XaaS (anything as a service). The as-a-Service...

Read More
Cyber Crime, Data & Cybersecurity

Trending in Cybercrime

You thought last year was bad (and the year before, and the year before that), but unfortunately, cybercrime is only likely to get worse in 2022. Worse both in terms of there being more of it, and in the forms...

Read More
Cyber Crime, Cyberattacks, Data & Cybersecurity

Cyberattack Disrupted Iranian Gasoline Supplies

Earlier this week, authorities from Iran reported a cyberattack on their gasoline infrastructure. This attack left citizens all over the country (who use government-issued electronic cards to purchase fuel at discounted prices) unable to pump or buy fuel. Citizens who...

Read More
Cyber Crime, Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management, Tools & Templates

Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and...

Read More
Cyber Crime, Cyber Risk, Cyberattacks, Cybersecurity, Data & Cybersecurity, Tools & Templates

APTs: The Newer, Smarter, and Actually Successful Wile E. CoyoteAPT tools and methodologies

Remember the old Looney Tunes cartoons where Wile E. Coyote nearly destroys himself in attempt after fruitless attempt to capture the Road Runner? The Road Runner seems to have a sixth sense when a trap is sprung across his path...

Read More
1 2