Threat actors’ actions can have far-reaching consequences, from a “trolling” message stirring up journalists and researchers, to a phishing email and few lines of code affecting thousands of developer machines. In this Leaky Weekly recap, we cover three cybercrime stories: Tune in as host and security researcher Nick Ascoli covers these stories below at Spotify, […] The post NPM Supply Chain Attack, Fake Europol Bounty, and Operation Secure appeared first on Flare | Threat Exposure ...| Flare | Threat Exposure Management | Cyber Threat Intel
The past few months have shown how social engineering, misconfigurations, and rushed development can lead to unfortunate outcomes for organizations, and the people who trust them with their personal data. In this Leaky Weekly recap, we break down three major stories: Tune in as host and security researcher Nick Ascoli covers these stories below at […] The post Tea App and TeaOnHer, and Salesforce Tenant Breaches appeared first on Flare | Threat Exposure Management | Cyber Threat Intel.| Flare | Threat Exposure Management | Cyber Threat Intel
Stealer logs have quietly become one of the most important drivers of cybercrime today. From ransomware to large-scale data breaches, these stolen digital records are often the first step in an attack. In part two of our Leaky Weekly (cybercrime current events podcast) mini-series: Use a Stealer Log, Go to Prison, we explore two major […] The post PowerSchool and Snowflake Arrests (Use a Stealer Log, Go to Prison: Part 2) appeared first on Flare | Threat Exposure Management | Cyber Threat I...| Flare | Threat Exposure Management | Cyber Threat Intel
If cybercrime were a country, it would have the world’s third-largest gross domestic product (GDP). Cybercrime is worth $10.5 trillion, according to researchers, placing it just behind the U.S. and China’s economies. It’s also growing; the threat actor economy is projected to expand to $12.2 trillion by 2031. As with any economy, cybercrime has stabilized, […] The post Inside the Cybercrime Economy: How Threat Actors Operate Like Businesses appeared first on Flare | Threat Exposure ...| Flare | Threat Exposure Management | Cyber Threat Intel
Stealer logs are at the center of today’s cybercrime economy. They’ve become a key enabler for ransomware, account takeovers, and corporate breaches, and law enforcement has taken notice. In part one of our Leaky Weekly cybercrime current events podcast mini-series: Use a Stealer Log, Go to Prison, we cover the importance of stealer logs in […] The post IntelBroker and Scattered Spider Arrests (Use a Stealer Log, Go to Prison: Part 1) appeared first on Flare | Threat Exposure Manage...| Flare | Threat Exposure Management | Cyber Threat Intel
Negotiators manage complex communication and pressure to minimize damage to organizations. Different ransomware groups can have different communication styles, and being aware of these can help organizations be prepared. Security teams can equip themselves for ransomware scenarios using threat intelligence on several cybercriminal groups we’ll cover here. Why Do Organizations Engage in Ransomware Negotiations? Organizations […] The post Prepare for Ransomware Negotiations: What Securi...| Flare | Threat Exposure Management | Cyber Threat Intel
Phishing kits are credential-harvesting operations that are disguised as standard web pages, and security teams can take advantage of them as intelligence assets.| Flare | Threat Exposure Management | Cyber Threat Intel