Requesting ransoms in cryptocurrency like Bitcoin and Monero gives cybercriminals a stateless, decentralized, and anonymized method of transferring funds. This makes payments easier to facilitate than a wire transfer or international payment in fiat currencies and reduces the risk of apprehension. Unlike bank accounts, crypto wallets can be anonymously created and accessed by anyone who […]
Blog Grid
The U.S. Department of Homeland Security’s Office of Intelligence and Analysis assess that ransomware attacks targeting US networks are likely to increase in the near and long term because cybercriminals have developed effective business models to increase their financial gain, likelihood for operational success, and anonymity. Growing demand for ransomware-as-a-service (RaaS) and the use of […]
Zoom went from having 10 million daily users in December 2019 to having 200 million daily users in March 2020. While several sectors suffer from the COVID-19 (coronavirus) pandemic, Zoom is one of the companies that is reaping huge benefits. Zoom gained over 1,900% in usage for claiming to offer end-to-end encryption and protecting the […]
Marriott International finds itself a victim of another major data breach, making it the second attack the hotel chain company has suffered in the past three years. The company announced on March 31st with details of the breach which affected 5.2 million hotel guests. The breach started in mid-January this year and went on for […]
Hackers always exploit vulnerabilities in architectural designs of IT devices and their unsuspecting users (individuals, organizations, corporations). As the world is currently at a standstill as a result of the Coronavirus (COVID-19), it is no better time to have unsuspecting users waiting to be preyed on. The past seven days has seen reported cases of […]
Cyberattacks have been a major concern for companies and governments, especially in the last decade. Companies and governments store large amounts of valuable information on their systems’ hardware, and without proper security, sensitive information may be vulnerable to cyberattacks. These attacks are sometimes used by malicious agents to obtain trade secrets and, therefore, gain an […]