poker credential stuffing attack

Poker Credential Stuffing Attack

by Mark Rudio | April 25, 2022 | Cyber Crime, Cyberattacks, Data & Cybersecurity, Hacking

Automated brute force attacks, also known as automated threats, are growing increasingly sophisticated. The Open Web Application Security Project (OWASP) currently lists 21 different methods of automated threats used by cybercriminals to hack into user accounts, ranging from CAPTCHA Defeat, which us ....

Trends in Ransomware What to Know About RaaS

Trends in Ransomware: What to Know About RaaS

by Kristen Hicks | April 8, 2022 | Cyber Crime, Cyber Risk, Data & Cybersecurity

By now we’ve all heard of SaaS (software as a service) and many have heard of IaaS (Infrastructure as a Service), PaaS (Platform as a Service), or the term that contains them all: XaaS (anything as a service). The as-a-Service business model, which usually has customers paying a subscription rate ....

Trending in Cybercrime

Trending in Cybercrime

by Tom Garrubba | January 21, 2022 | Cyber Crime, Data & Cybersecurity

You thought last year was bad (and the year before, and the year before that), but unfortunately, cybercrime is only likely to get worse in 2022. Worse both in terms of there being more of it, and in the forms it takes being more destructive. How to Prepare for a Cyberattack To help you prepare, h ....

Untitled 9

Cyberattack Disrupted Iranian Gasoline Supplies

by Vivian Nguyen | October 28, 2021 | Cyber Crime, Cyberattacks, Data & Cybersecurity

Earlier this week, authorities from Iran reported a cyberattack on their gasoline infrastructure. This attack left citizens all over the country (who use government-issued electronic cards to purchase fuel at discounted prices) unable to pump or buy fuel. Citizens who attempted to acquire fuel re ....

Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

January 13, 2017 | Cyber Crime, Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management, Tools & Templates

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and military intelligence S ....

APTs: The Newer, Smarter, and Actually Successful Wile E. CoyoteAPT tools and methodologies

January 15, 2016 | Cyber Crime, Cyber Risk, Cyberattacks, Cybersecurity, Data & Cybersecurity, Tools & Templates

Remember the old Looney Tunes cartoons where Wile E. Coyote nearly destroys himself in attempt after fruitless attempt to capture the Road Runner? The Road Runner seems to have a sixth sense when a trap is sprung across his path and always escapes unscathed. Well, when it comes to cyber attacks, ....

Next Page »