McAfee Sees Ransomware-as-a-Service, Cryptocurrency and Internet of Things Threats Surge in Q1 2021.

McAfee Sees Ransomware-as-a-Service, Cryptocurrency and Internet of Things Threats Surge in Q1 2021.
A 6-year cyberespionage campaign uncovered in the Middle East.
Gangs of cyber criminals, organising themselves along the lines of drug cartels, are changing the ‘rules’ of ransomware attacks to keep ahead of the authorities’ efforts to thwart their activities. That’s the conclusion of a new report by leading cyber analytics expert CyberCube.
At least 16 countries in the MEA region, including Egypt, Saudi Arabia, and the United Arab Emirates, are being targeted by scammers who are harvesting user personal and payment data via a multistage scam that exploits at least 138 popular brands. Group-IB outlines the MEA countries and the various verticals which were targeted by the scams, alongside the impacts of the ongoing “scamdemic”.
Advanced threat actors are continuously changing their tactics, sharpening their toolsets, and launching new waves of activity. That’s why, to keep users and organisations informed about the threats they face, Kaspersky’s Global Research and Analysis team provides quarterly reports about the most important developments in the advanced persistent threat landscape.
Cybereason Discovers Global Botnet Campaign Leveraging Microsoft Exchange Vulnerability. The Prometei Botnet crosses many industries and countries globally; Victims are random, making the botnet more dangerous and widespread.
In-person GISEC 2021 to spark industry collaboration against cybercrime spike. Dubai World Trade Centre will host GISEC from 31st May-2nd June.
The danger within: 32% of users in United Arab Emirates under threat from malware hiding within their devices.
Cisco has conducted research to discover the top malware threats across industries in 2020 with in its new “DNS Security” report. It follows extensive analysis of malicious DNS activity and threats from January to December last year.
We think of cyber criminals as sitting in basements, plotting to subvert technology by breaking through the firewall, but the reality is that the problem is a human one. Technology is actually quite effective at withstanding attacks, so the attackers target the most vulnerable spot – the user.
GET TAHAWULTECH.COM IN YOUR INBOX