"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
Business email compromise (BEC) attacks have been on the rise in recent years, with losses due to such scams growing...
Read moreFive people have been arrested in France for their alleged involvement in a massive phishing campaign that used an IMSI-catcher...
Read moreMustang Panda, also known as Bronze President (Secureworks) and Earth Preta (Trend Micro), is a state-sponsored advanced persistent threat (APT)...
Read moreThe world was shocked to learn that North Korea's hacking abilities have evolved to the point of being able to...
Read moreThe recent cyber attack on the financial technology firm Ion Trading has once again brought the issue of ransomware attacks...
Read moreThe lines between state-sponsored Advanced Persistent Threat (APT) attacks, cybercrime, and hacktivism are increasingly becoming blurred. This convergence has created...
Read moreBring Your Own Filesystem (BYOF) attacks are a relatively new tactic in cybercrime operation, used to evade detection by security...
Read moreAs with traditional crime, cybercrime is first and foremost a business. In recent years, the cybercrime landscape has undergone significant...
Read moreAs the world becomes increasingly digital, the use of cloud services has skyrocketed. In the wake of the pandemic, cloud...
Read moreThe cyber security landscape has been for years dominated by the ransomware phenomenon. But one of the most significant developments...
Read moreXRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.