Behind The Scenes: What Happens To Your Personal Information Once Stolen

As yet another headline related to a massive data breach makes it to the front page of publications across the world, it is perhaps time to take a step back and try to grasp the bigger picture. If you’re one of the countless individuals that can’t help but ask ‘Why?’ when faced with this sort of news, this article is for you.

Hook, line and sinker

Photo by Chester Ho on Unsplash

A fisherman baits a hook and launches it on the surface of a lake, waiting for something to bite. Phishing attempts work in a similar way, only instead of sitting by the shore and launching baited hooks, attackers sit behind their computer screens and send out attention-grabbing messages. The technique is now decades old, having started sometime around 1995, and it was first mentioned on January 2nd, 1996 in a Usenet newsgroup aptly named AOHell. As years have come and gone, phishers have diversified and perfected their trade, but the same concept lies behind both modern and ancient phishing techniques.

Fileless Threats: what you need to know

Photo by rawpixel on Unsplash

Malware has traditionally been spread in the form of files that made their way on the target machine’s storage drives. As cybersecurity evolved to deal with tangible threats, cybercriminals across the globe have developed new techniques meant to evade detection from security solutions. Enter fileless threats: snippets of code that can use legitimate resources, which are already present on workstations, to disrupt the normal functioning of the system. They normally target Windows machines and reside in a system’s memory or, if persistence is a required feature, in its registries. Since the malware doesn’t make its way onto the disk, there are no signatures that antivirus or other antimalware software can compare against a known database.

Coffee, the not so secret ingredient which makes the wheels spin in a startup

Photo by BRUNO CERVERA on Unsplash

Coffee is part of our daily ritual at CyberSwarm. We simply cannot imagine life without it. Generally, we associate it with the “aha” moment, when the wheels in our brain start moving and things begin to connect. In the morning, coffee is the charmed liquid which helps us clear our head and shake off the last remnants of sleep. At noon, it is the natural sequel to a copious lunch and an energy booster. In the afternoon it’s our guilty pleasure and the relaxation we need after a long and tough day.

Cybercrime, from another point of view

Photo by Shane Hauser on Unsplash

Cybercrime itself has become a lucrative domain – a large number of dark net forums and marketplaces exist so that criminals can share and monetize the data of individuals, companies and institutions. Such websites distribute malware and information about vulnerabilities to would-be hackers that often pay heft sums to stay ahead of the best cybersecurity practices. They also serve as rally points for hackers to organize themselves at – hackers who are oftentimes sponsored by nation-states and corporations. They are constantly trying to take down targets that will provide them with plentiful bounty or outstanding reputation. John Mcafee is among the high-profile targets of such groups – the inventor of the first antivirus has claimed multiple times that some of his social media accounts have been compromised, as the hackers consider such an achievement to be a badge of honor.

CyberSwarm
Cyberdeception. Powered by Hardware.
LET’S CONNECT