Tag Archives: cybercrime

Brilliant Video Showing The Anatomy of An Attack

Cisco made a great video (4 minutes) that I honestly think everyone must see. It breaks down a complex ransomware attack. Picture this happening to your organization. Are you ready for it?

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Brilliant Video Showing The Anatomy of An Attack

2016 San Francisco CISO Executive Summit

I had the privilege of attending the 2016 CISO Executive Summit in San Francisco on Monday the 5th. I went with a great group of people! There was a lot of good discussions regarding leadership, insider threats, third party management, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 2016 San Francisco CISO Executive Summit

Confessions of a Cyber Spy Hunter

With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Confessions of a Cyber Spy Hunter

1/3 of Wendy’s Locations Compromised

1,025 out of the 3,000 Wendy’s locations had malware on their Point-Of-Sale systems. Investigation has uncovered that infection and exfiltration of credit card information (names, numbers, expiration dates) going back to January of 2015. We believe this series of cybersecurity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on 1/3 of Wendy’s Locations Compromised

LinkedIn Breach Data Leaked

Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on LinkedIn Breach Data Leaked

Hackers Hold Hospital Healthcare Data Hostage

Hollywood Presbyterian Medical Center’s data systems have been infected with encrypted ransomware. The hospital says patient care has not been compromised, though the cyber-attack has forced them to revert to paper registrations and medical records and send patients seeking emergency … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hackers Hold Hospital Healthcare Data Hostage

It’s Tax Season ∴ CyberThieves Are Working Full Time!

With most things going electronic, it’s beneficial to be aware of some of the tricks a con-artist would use to get your W-2 and try to claim your tax refund before you have the chance to. One popular method is … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on It’s Tax Season ∴ CyberThieves Are Working Full Time!

Social Engineering Fraud Losses Doubled in 2015

Consider the largest breaches of 2015 and realize they weren’t about getting financial data directly. It was all about personal details. Identity theft is a hotter commodity on the dark web, than credit card numbers. Anthem 80 million (Personal Details) Ashley … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Social Engineering Fraud Losses Doubled in 2015

Scottrade Breach

“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Scottrade Breach

Business Email Compromise Leads to $737,000 Transfer to China

The FBI classifies “phishing that leads to loss” as Business Email Compromise (BEC). In a recently released story that closely matches the BEC hack in Omaha I wrote about back in February, another company fell victim to a spearphishing attack … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Business Email Compromise Leads to $737,000 Transfer to China