Cybercrime

2021 Bitdefender Global Report: Cybersecurity and Online Behaviours

Executive Summary PLATFORMS, APPLICATIONS,SERVICES Internet users have on average8 online platform accounts. Of those analyzed, the top used are Facebook, WhatsApp, Gmail and YouTube. There are several usage differences among males and females and across age groups. Facebook and WhatsApp are used most by those 25+, Gmail is more popular after 35, while YouTube and […]

2021 Bitdefender Global Report: Cybersecurity and Online Behaviours Read More »

FIN8 Threat Actor Goes Agile with New Sardonic Backdoor

Since January 2016, FIN8 has been steadily building a reputation among financially motivated advanced threat actors. Bitdefender researchers are constantly monitoring this group’s activity, and previous research released in early 2021 documented the use of a new, improved version of the BADHATCH backdoor. This whitepaper focuses on the analysis of a new backdoor component discovered

FIN8 Threat Actor Goes Agile with New Sardonic Backdoor Read More »

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation

GOALS The goals of this paper are to demonstrate how dangerous ransomware has become, describe the latest techniques used by ransomware gangs, and suggest what your organization can do to reduce exposure to, and damage from, ransomware attacks. Three ransomware attack vectors are addressed in this order: remote access, email, and supply chain. RANSOMWARE —

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation Read More »

Global Incident Response Threat Report

Manipulating reality: The rise of business communication compromise, time-stamp manipulation, and cloud-jacking empowers adversaries to execute integrity attacks Key findings Attacks are becoming more destructive and targeted through advanced techniques. Respondents indicate that targeted victims now experience integrity and destructive attacks more than 50 percent of the time. Cybercriminals are achieving this through emerging techniques,

Global Incident Response Threat Report Read More »

The State of Secure Identity

Traditionally, the information security domain has examined identity through the lens of the corporate enterprise. In this context, user lifecycle management is about onboarding and managing the identity of employees who need access to corporate systems. For consumer-facing businesses, customer identity and access management (CIAM) is just as critical. And, this is why I’m so

The State of Secure Identity Read More »