Malware Variants: More Sophisticated, Prevalent and Evolving in 2021

A malicious program intended to cause havoc with IT systems—malware—is becoming more and more sophisticated every year. The year 2021 is no exception, as recent trends indicate that several new variants of malware are making their way into the world of cybersecurity. While smarter security solutions are popping up, modern malware still eludes and challenges … Continue reading Malware Variants: More Sophisticated, Prevalent and Evolving in 2021

1.3M Clubhouse Users’ Data Dumped in Hacker Forum for Free

Clubhouse denies it was ‘breached’ and says the data is out there for anyone to grab. Clubhouse, the startup invitation-only chat app, is the latest social-media platform to see mammoth troves of user data collected and posted in underground forums. An SQL file containing the personal data of 1.3 million Clubhouse users has been posted … Continue reading 1.3M Clubhouse Users’ Data Dumped in Hacker Forum for Free

2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same

Cybersecurity has gone through many phases over the last few decades. Today, we hear about a new, more volatile-than-the-last attack every day that has the potential to disrupt business. These cyber-threats are hazardous to company structure and can lead to interruptions in production and loss of revenue. While these attacks may seem unavoidable, it is … Continue reading 2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same

Over 600,000 stolen credit cards leaked after Swarmshop hack

The hacking spree targeting underground marketplaces has claimed another victim as a database from card shop Swarmshop emerged on another forum. By the looks of it, the leak contains the records of the entire Swarmshop community along with all the stolen card data traded on the forum. Full data dump Details about the hack remain … Continue reading Over 600,000 stolen credit cards leaked after Swarmshop hack

5 Ways to Transform Your Phishing Defenses Right Now

By transforming how you approach phishing, you can break the phishing kill chain and meaningfully reduce your business risk. When I talk with chief information security officers (CISOs) about email security, I often hear something like this: They have a problem with phishing attacks. So, they buy new security software. But the CEO continues receiving … Continue reading 5 Ways to Transform Your Phishing Defenses Right Now