The Anti-Fraud Lifecycle

It is a known fact that cybercriminals choose the path of least resistance. Naturally, easy cashout methods with good returns are much more favorable than methods that are high risk, complicated or yield small profits. While this is not the only factor in determining how much fraud is committed through a certain vector (for example, […]

The Case for Taking Down Dark Web Sites

Ever since the first dark web monitoring services became available, around 2005, consumers of such services often asked – why aren’t these websites being taken down? After all, the sites that comprise the dark web are platforms and tools for illegal activities. The answer, which used to satisfy most, was that these sites are intelligence sources and taking them […]

Venture Capitals are Targeted by BEC Fraud

On February 19th, venture capital giant Sequoia disclosed to its investors that it has been the victim of a data breach. A few days later additional information became available, indicating that it was targeted in a Business E-mail Compromise (or BEC) attack. According to the company, attackers gained access to one of their employees’ corporate […]

The Lesser Known Threats of Rogue Mobile Applications

Ever since Apple introduced its App Store in 2008 and Android followed suit, apps have become an integral part of our lives. With millions of apps available on each official store, they quickly became the de-facto way of obtaining and installing new software on a smartphone. However, while the vast majority of apps that are […]

The Dark Web’s Popularity Draws New Members, Becomes More Local

The Dark Web has existed in its current form for over 15 years. While it has evolved and changed, the concept of threat actors, each with their own expertise, congregating in communities to trade their products and services has remained unchanged. For many years it was the focus of professionals, law enforcement agents and security […]

Introducing DAIC: A Suggested System for Preventing BEC Fraud

BEC Fraud (Business E-mail Compromise) has reached epidemic levels in recent years. In 2019, the FBI’s Internet Crime Compliant Center, reported that it received complaints with adjusted losses of over $1.7 billion from this type of scam. The reported cases to the IC3 is just a drop in the bucket compared to the overall amount of incidents online. […]

6 Ways Similar Domains Can be Used to Target Your Organization

Certain threats that organizations face online often involve the attacker registering a domain that is very similar to the targeted organization’s domain. This is done to support the attacker’s goal, enabling them to better impersonates the company in order to fool potential victims, employees or customers. As Domains are relatively cheap and easy to register […]

Revisited After a Decade: The Optimist’s Cybercrime Predictions for 2011

In 2010, in a different world where no one has heard about lockdowns and social distancing, I wrote an article on SecurityWeek – The Optimist’s Cybercrime Predictions for 2011. While I was not very original in my choice of subject, as the end of every year provides security bloggers worldwide with an easy choice of subject to write […]

When it Comes to Threat Intelligence, a Multi-Vendor Strategy is Needed

The fact that there is no silver bullet for cyber security, but instead every organization needs to work with a variety of vendors, has shaped the common practices of how we purchase security solutions. In many cases, there’s a checklist – we need a firewall, an end-point protection solution, a SIEM, a penetration service, a cloud […]

So Wait, What Exactly IS the Dark Web?

Cyber security always had a thing with terminology. Back in the day, its very name was the subject of many articles that tried to explain how “Cyber” is different than traditional infosec. The term “Advanced Persistent Threats” was also under scrutiny when it became popularized, with many experts claiming that certain nation-state attacks were not […]