Vault 7 Has Few Surprises

This week WikiLeaks published a collection of internal documents from the CIA describing some of their hacking and surveillance tools. The press release that accompanied this was full of hyperbole, and some of that was picked up by the initial press coverage, so just to set the record straight: The CIA can only bug your […]

Ransomware By The Numbers

Last year, we saw a strong increase in ransomware attacks. These attacks proved to be a money maker for many cybercriminals, offering a simple business model that targeted end users, enterprises, cloud services, and databases, exploiting a lack of data backups for hefty bitcoin payouts. In fact, 51 percent of ransomware attacks result in the victim […]

Email Address Usage on the Dark Web

Last week, Anonymous compromised and took down Freedom Hosting II, the largest hosting service for Dark Web sites, and published the contents of the internal databases for those websites. Many of these databases contained email addresses forum users etc. We extracted the email addresses and took a look to see how users of the Dark […]

Spear Phishing: Not Just For Finance

Phishing, and particularly spear phishing, may be low tech, but it remains one of the most potent tools in the cyber criminal’s toolbox. In the past it has usually been used for financial crimes, along with some industrial and national espionage, but there is an alarming increase in attacks aimed at more general intelligence gathering. […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2017 Cloudmark, Inc.