Data Breaches

Deepfake AI Facial Recognition

Deepfake Video with Biometric Technology Tricking Law Firms And Exfiltrating Money

Scams and Deception Deepfake video and sophisticated scams that manipulate video and audio to create highly convincing fake identities or messages from what appear to be trusted individuals are creating a major risk for law firms, the UK Solicitors’ Regulation Authority (SRS) says. The SRA issued a caution to lawyers who heavily rely on video […]

Deepfake Video with Biometric Technology Tricking Law Firms And Exfiltrating Money Read More »

Sniper Watch: Stop, Call, Wait

Is Your Business Prepared for a Cyber Incident?

Is Your Business Prepared for a Cyber Incident?   In today’s digital age, having a well-written Incident Response plan is not optional, it’s essential. Yet many companies find themselves unprepared when disaster strikes. We recommend these immediate actions for managing unexpected cybersecurity incidents: Stop, Call, Wait. . Stop: Don’t panic.  Halt all operations safely and

Is Your Business Prepared for a Cyber Incident? Read More »

CPA Firms - Cybersecurity

Top Business & Cybersecurity Concerns for CPAs in 2023

Cybersecurity Impact on CPA Firms Cybersecurity is a critical issue for businesses and organizations of all sizes and industries, and the accounting profession is no exception. In today’s digital age, sensitive financial data and information are increasingly at risk of being compromised by cybercriminals who seek to steal valuable data, commit fraud, or cause disruption

Top Business & Cybersecurity Concerns for CPAs in 2023 Read More »

Hacker uses new ‘Screenshotter’ malware tool to target organizations

A new hacker identified as TA886 targets organizations in the US and Germany with the new custom malware tool “Screenshotter” to perform surveillance and data theft on infected systems. According to BleepingComputer, the previously unknown cluster of activity was first discovered by the US-based security firm Proofpoint in October 2022.  The hacker appears to be

Hacker uses new ‘Screenshotter’ malware tool to target organizations Read More »

Hackers Use Powerpoint (.PPT) files for Triggered ‘MouseOver’ Malware Delivery Attack

Hackers believed to work for Russia have started using a new code execution technique that relies on mouse movement in Microsoft PowerPoint presentations to trigger a malicious PowerShell script. No malicious macro is necessary for the malicious code to execute and download the payload, for a more insidious attack.  A report from threat intelligence company

Hackers Use Powerpoint (.PPT) files for Triggered ‘MouseOver’ Malware Delivery Attack Read More »

Top Cybersecurity Breaches - 2021

2021: Top Cybersecurity Data Breaches – The Year in Review

*Alert*: Sniper Watch C3 – Inadequate cybersecurity posture continues to be a major leading cause to continued data breaches, disruption, and dismantling of corporate operations. In 2021, thousands of new cybersecurity incidents have been recorded and cyberattacks are continuing to rise.  Cybersecurity insurance premiums are skyrocketing and most organizations are not properly protected from these

2021: Top Cybersecurity Data Breaches – The Year in Review Read More »

Guess Ransomware Attack

Guess Confirms Ransomware Attack and Data Breach

Clothing retailer Guess suffered a ransomware attack and data breach earlier this year that exposed personal information for an unspecified number of individuals. As Bleeping Computer first reported, citing a data breach notification letter issued by Guess to 1,304 affected Maine residents, Guess says criminal hackers accessed its systems from approximately Feb. 2 to Feb. 23 and that the

Guess Confirms Ransomware Attack and Data Breach Read More »

LinkedIn Data Breach

700 Million LinkedIn User’s Data Collected by Hackers

Collected data makes it easier for spammers, phishers and stalkers Data scraped from about 700 million LinkedIn profiles — more than 90% of the entire declared LinkedIn member base — is being offered for sale in an online cybercrime marketplace. The data includes full names, workplace email addresses, dates of birth, workplace addresses, mobile phone

700 Million LinkedIn User’s Data Collected by Hackers Read More »

Cryptomining

Fileless Malware on the Rise, Hackers Now Cryptomining Gamers’ PCs

The value of cryptocurrencies has fluctuated wildly, but the value is still high enough to garner a lot of attention, both legitimate and malicious. Most of the malicious activity we see is done for financial gain, and cryptocurrencies have provided attackers with a lucrative new avenue to pursue: cryptocurrency mining. Over the past year, we

Fileless Malware on the Rise, Hackers Now Cryptomining Gamers’ PCs Read More »

Scroll to Top