Threat Intelligence

Typically, when cryptocurrency values change, one would expect to see changes in crypto-related cybercrime. In particular, trends in Bitcoin values tend to be the bellwether you can use to predict how other currencies’ values will shift, and there are usually corresponding shifts in crypto-based crime, such as ransomware, though it’s not necessarily the kind of […]

The post How Cryptocurrency and Cybercrime Trends Influence One Another appeared first on Webroot Blog.

Read More How Cryptocurrency and Cybercrime Trends Influence One Another

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. According to the 2021 Webroot BrightCloud® Threat Report, each of these threat types saw significant fluctuations as people all over the world […]

The post Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report appeared first on Webroot Blog.

Read More Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

The supply chain attack that Trojanized a SolarWinds update to infect and spy on the IT management platform’s customer base continues to be analyzed. Early reports have called the methods highly sophisticated and the actors highly trained. We do know that IP addresses, a command and control server and a malicious product update file were […]

The post Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs appeared first on Webroot Blog.

Read More Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs

Today, the average enterprise uses over 2000 cloud applications and services, and we expect this number will continue to grow as more businesses realize the efficiency, flexibility and collaboration benefits these services bring. But the use of cloud-based applications also comes with a few caveats; for example, the apps themselves may pose potential security vulnerabilities, […]

The post How to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications appeared first on Webroot Blog.

Read More How to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications