New Brand, New Insights
SenseCy
by Gilad_Zahavi
3y ago
Dear Reader, In December 2019, Verint announced plans to separate into two independent publicly traded companies. As of today, the Verint Cyber Intelligence division will become a standalone company traded on the Nasdaq stock exchange and rebranded as Cognyte Software. As part of the transition, we will continue to publish our posts on the Cognyte blog and our Twitter feed will now be updated through the Cognyte account. We will keep you updated with professional insights under the Cognyte brand and we look forward to continue our engagement ..read more
Visit website
How to Avoid 2020 Online Shopping Threats
SenseCy
by cyberthreatinsider
3y ago
The shopping season is upon us and as in previous years, cybercriminals are preparing multiple ways to target the online shopping community, including phishing attempts to steal financial details, malspam campaigns distributing malware and more. In fact, while examining the credit card trade in the Dark Web during 2019, we discovered that the highest number of stolen cards offered for sale on dedicated marketplaces was in November 2019 with over 32M cards, although we should take in consideration that there are duplications of data, since it is likely that cybercriminals will try to sell the s ..read more
Visit website
COULD A CYBER-ATTACK ON E-VOTING SYSTEMS AFFECT THE UPCOMING US ELECTIONS?
SenseCy
by cyberthreatinsider
3y ago
Yes it can. With the US elections just around the corner, we thought this would be a good opportunity to talk about cybersecurity risks of election processes, as more and more elections around the world, are turning into electronic voting (or e-voting) systems. The first electronic voting systems for electorates were introduced in the 1960s, with the debut of the punched card systems. E-voting systems have evolved over time as technology advanced, and nowadays include Direct Recording Electronic voting machines, optical scanners, ballot marking devices, electronic poll books and online voting ..read more
Visit website
ARE RUSSIAN CYBERCRIMINALS OFFERING HACKING SERVICES IN CHINA ?
SenseCy
by cyberthreatinsider
3y ago
On July 27, 2020, a group of threat actors published a post in the advertisement section of a prominent Chinese Darknet marketplace offering hacking services. Hacking-as-a-service offers appear frequently on Chinese underground platforms, and many actors publish these services – accompanied by varying degrees of details – on both Clearnet hacking forums and Darknet marketplaces. However, what makes this offer unique is the identification of the actors, who claim to be Russian. WHAT INDICATES THAT THE HACKERS ARE REALLY RUSSIAN ? Several linguistic features suggest the actors are ind ..read more
Visit website
WILL THE NEW SHAREPOINT FLAW BECOME AN ACTORS’ FAVORITE?
SenseCy
by cyberthreatinsider
3y ago
Attacking SharePoint servers is a popular threat, apparently because in many cases the SharePoint servers are integrated in the Active Directory service. Gaining access to the Active Directory allows attackers to gain a foothold inside the victim’s network. Furthermore, since SharePoint servers are exposed to the internet, attacks can be executed relatively easily. As an example, the CVE-2019-0604 SharePoint vulnerability, disclosed and patched in 2019, has gained popularity among threat actors, who have exploited it in different attacks since it was published. This is particularly true among ..read more
Visit website
GLOBAL RANSOMWARE ATTACKS IN 2020: THE TOP 4 VULNERABILITIES
SenseCy
by cyberthreatinsider
3y ago
Our team recently investigated the prominent ransomware attacks reported since the beginning of 2020 in order to draw general conclusions about these attacks and to reveal commonalities between them.  We also wanted to better understand the threat they pose and how to protect against it. While examining approximately 180 different ransomware incidents, we found that the most targeted sectors were Technology (11%), Government (10%), Critical Infrastructure (8.6%), Healthcare and Pharmaceutical (8%), Transportation (7%), Manufacturing (6%), Financial Services (5%) and Education (4%). It was ..read more
Visit website
DDoS Attacks for Hire: How the Gambling Crave Fuels Cybercrime in China
SenseCy
by SenseCy_Team
4y ago
The Forbidden Fruit – Gambling in China Many card and board games are believed to have originated in Ancient China. Some of these games involved betting and gambling and they have been an inherent part of the Chinese leisure culture for centuries. This changed when the Communist Party seized power in 1949, declaring gambling a “corrupt, feudal practice” and hence strictly banned by law. When the Reform and Opening-up policy was introduced in China in the late 1970’s and early 1980’s, the authorities have somewhat released their strong grip on gambling and card games. Gaming and carding parlor ..read more
Visit website
Changes in the Threat Landscape under the Global Influence of COVID-19
SenseCy
by SenseCy_Team
4y ago
In this report, Verint’s Cyber Threat Intelligence Group (powered by SenseCy) presents an analysis of how the COVID-19 global outbreak changed the threat landscape and how in the case of cyber threats too, the curve has flattened and the number of COVID-19 related cyber incidents, is in decline. KEY FINDINGS The peak of the curve was in the second half of March 2020, after which we see a decline in the number of COVID-19 related malicious activities. Malspam and phishing/spear-phishing have been the most popular attack vectors between the 1st of March and 18th of April – used in 66 ..read more
Visit website
The New SMBGhost Wormable Vulnerability is Gaining Popularity in The Dark Web
SenseCy
by SenseCy_Team
4y ago
On March 10, 2020, details about a zero-day vulnerability (CVE-2020-0796) affecting the Microsoft Server Message Block (SMB) protocol, were accidentally exposed by security companies. SMB is a network communication protocol responsible for granting shared access to files, printers and serial ports between the different devices on the network. In this blog post we reveal some of the activities we identified in the dark web and explain why this specific vulnerability has the potential to become a “wormable” attack that can spread fast. The CVE-2020-0796 vulnerability, which received the moniker ..read more
Visit website
Hackers Continue to Exploit the COVID-19 Pandemic in Malicious Campaigns
SenseCy
by SenseCy_Team
4y ago
As the Coronavirus (COVID-19) pandemic continues to spread throughout the world, a growing number of malicious campaigns were identified, attempting to exploit the constant search for information and updates on the virus, in order to spread various types of malware. In this blog post we share our analysis of one of the major Coronavirus related malicious campaigns and provide an overview of other campaigns. In addition, for your convenience, you will find at the end of the post a list of IoCs to implement in your security systems. The COVID-19 Interactive Map – The Malicious Version Security ..read more
Visit website

Follow SenseCy on FeedSpot

Continue with Google
Continue with Apple
OR