The fact that multiple databases of stolen records are shared for free on Dark Web platforms is not new. Stolen data can be used for various types of attacks, including spear-phishing, random malspam campaigns, etc. But a new, concerning data breach trend is emerging. Across Dark Web forums, services offer large-scale data filtered by categories,…
Details of 1 million stolen credit cards were recently shared on the dark web, free of charge, hoping to draw hackers to a new card marketplace. Learn about the new marketplace and the top email address domains that were shared.
Read insights on the state of ransomware attacks in 2021 from our Cyber Threat Intelligence Research Group. Learn about greatest cybersecurity risks & who are targeted.
Must haves for Security Analytics platforms One of the biggest challenges of cyber security teams is to have a good vulnerability management policy, since it is practically impossible to patch every vulnerability out there. Cognyte scoured the Deep and Dark Web to discover the most popular CVEs among threat actors during the last year. We…
Security organizations are still struggling to tap the full potential of the data they have access to, preventing them from making rapid, data-driven decisions.- and as a result are moving to open, modern platforms for security analytics.
2020 was the year ransomware evolved. From data encryption to data exfiltration – ransomware groups are adopting the “double extortion” tactic to increase chances of a payout. Cognyte’s CTI research group analyzed 1,112 ransomware attacks carried out by 21 ransomware groups during 2020 – all of which involved data exfiltration to increase ransomware payouts.
In early February 2021, many of us took note when Tesla bought $1.5 billion in Bitcoin and announced that going forward it would accept cryptocurrency as payment. Cryptocurrencies, such as Bitcoin, Ethereum, Ripple, Bitcoin Cash, Monero, and others, are no passing phase, empty buzzword, or the esoteric interest of tech savvy enthusiasts. To the contrary,…
Suffering from ‘data fusion fatigue’ ? overwhelmed by data ingestion and data synchronization challenges? Learn how Cognyte’s security analytics platform fuses data from virtually all data sources, handles data contents of all types, visualizes insights, generates actionable intelligence, and drives smarter security and intelligence decisions.
In this blog, we present the findings of Cognyte’s research into the challenges that are preventing security organizations from leveraging their data to gain actionable insights.
Digital transformation – the integration of technology into all areas of life – intrinsically changes how organizations and individuals do things. Everything, from business processes to personal habits, has been impacted by digital transformation. But digital transformation can be a double-edged sword. According to Professor Audrey Kronin, in her book, Power to the People: How…
More results...