The world of malware and cybercrime has evolved a great deal in the last decade. The following blog post tracks this evolution, expanding on intelligence accessible through Threat Compass. The more we understand about the motivations and TTPs of threat actors, the stronger defenses we can build against cybercrime....
Today we launch our Annual Cyberthreat Landscape Report for 2018-19, providing insights into emerging and evolving cybersecurity trends. By sharing intelligence and collaborating with the industry, we are in a much better position to fight cybercrime this year. The report reveals that botnet stolen credentials increased by a staggering fifty...
141% increase in compromised credentials detected in North America during Blueliv quarterly analysis Fewer compromised European and Asian credentials detected over same period (22% and 36% decreases respectively) LokiPWS malware family distribution continues to increase faster than Pony this quarter Our latest quarterly credential theft analysis follows the initial...
Humans are often described as the weakest link in the cybersecurity chain. This is certainly true to an extent: witness the fact that phishing enabled 93% of data breaches last year. However, it might be more accurate to describe credentials themselves as the biggest threat to organizations. Whether we’re...
Most IT security teams today are under a huge amount of pressure. With dwindling human resources, they must tackle a growing volume and range of sophisticated threats, as well as support ambitious digital transformation projects which could make or break the fortunes of their organization. Faced with this uphill...
Why Proactive Cybersecurity Begins with Monitoring for Compromised Credentials Most IT security teams today are under a huge amount of pressure. With dwindling human resources, they must tackle a growing volume and range of sophisticated threats, as well as support ambitious digital transformation projects which could make or break...
Password Theft and passwords represent the “keys to the kingdom” in our modern, digital-centric world. They protect our personal and corporate email, our social networking accounts, and access to our most sensitive financial and healthcare data. At a business level, they’re also still widely used to protect enterprise accounts,...
Today’s CIOs and CISOs have a problem. On the one hand they’re under increasing pressure to support digital transformation efforts designed to drive business growth and agility. But in moving to new technology platforms they inevitably also expose the organization to increased cyber risk. One of the most damaging...
Cybercriminals are stealing credentials using a wide range of techniques, tactics and procedures. The compromised data has a variety of uses and enables attackers to breach organizations and steal sensitive information. In fact, all it takes is a single good credential to gain access to an organization’s infrastructure and...
39% increase in compromised credentials detected in Europe and Russia in 2018 Europe-only credential theft success at 62% growth rate Europe and Russia home to half of credential theft victims worldwide (49%) LokiPWS malware family distribution increases over 300% since start of 2017 Today we announced our new report...
Botnets and other malicious software attacks that compromise corporate PCs are increasing at an alarming rate and growing in sophistication. In the first half of the year, Blueliv detected and analyzed more than 10 million stolen credentials and credit cards and is now tracking more than 220,000 live crime...
Stealing payment card data has become an everyday crime that yields quick monetary gains. The goal is to steal the data stored on the magnetic stripe of payment cards, clone the cards, and run charges on the accounts associated with them or even burn credit card track information into...