Search Results for: extortion Blog Post GDPR Extortion Campaigns are on the Horizon August 9, 2018 In recent years, DDoS and ransomware attacks have been the norm in cybercrime activity. Following the implementation of EU’s General... Blog Post Hoax Bomb Threats Sent in Bitcoin Extortion Scam December 15, 2018 Organizations around the country have received bomb threats in their inboxes. These email campaigns demanded a large sum of money... Newsletter Hoax Bomb Threats Sent in Bitcoin Extortion Scam December 18, 2018 Blog Post Increase in Extortionate Emails – USSS Information Alert May 1, 2020 The United States Secret Service has recently observed an increase in extortion email scams. These are not necessarily new methods... Blog Post Ransomware Gangs Stoop To Cold-Calling Victims When They Restore From Backups Without Paying December 11, 2020 Stooping to further moral degradation, some ransomware gangs are now cold-calling victims in a bid to direct pressure on them.... Blog Post Sextortion Emails – A Variant of Cyber Extortion Holding Ransom Your Character in Exchange for Bitcoin Money August 5, 2018 LIFARS is frequently called in to address cyber extortion. A popular recent variant is sextortion emails. In this scheme, an email is received falsely... Blog Post Blockchain Technology: What You Need to Know April 29, 2020 The blockchain originated from Bitcoin. As the underlying technology of Bitcoin, it is essentially a decentralized database. It refers to... Blog Post What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on... Blog Post How the U.S. Cyber Insurance Market Is Performing? March 23, 2020 Since the 1990s, the acceleration of the development of insurance solutions for network security has gradually started and has been... Blog Post Gangs Launch DDoS Attacks To Push Victims Into Paying Ransom November 11, 2020 Cybercriminals have perpetuated conducting fraudulent activities, but this time with another ransomware called SunCrypt. This new malicious software bars victims... Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Blog Post USSS Increase in Extortionate Emails Alert February 19, 2019 The United States Secret Service has recently observed an increase in extortion email scams. These are not necessarily new methods... Blog Post 6th Annual New York Metro Joint Cyber Security Conference (NYMJCSC 2019) September 12, 2019 Cyber Extortion – Presentation at NYMJCSC by LIFARS CEO Ondrej Krehel part 1. (Credit: Internet Society) Please join LIFARS founder... Blog Post Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are... Blog Post Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...
Blog Post GDPR Extortion Campaigns are on the Horizon August 9, 2018 In recent years, DDoS and ransomware attacks have been the norm in cybercrime activity. Following the implementation of EU’s General...
Blog Post Hoax Bomb Threats Sent in Bitcoin Extortion Scam December 15, 2018 Organizations around the country have received bomb threats in their inboxes. These email campaigns demanded a large sum of money...
Blog Post Increase in Extortionate Emails – USSS Information Alert May 1, 2020 The United States Secret Service has recently observed an increase in extortion email scams. These are not necessarily new methods...
Blog Post Ransomware Gangs Stoop To Cold-Calling Victims When They Restore From Backups Without Paying December 11, 2020 Stooping to further moral degradation, some ransomware gangs are now cold-calling victims in a bid to direct pressure on them....
Blog Post Sextortion Emails – A Variant of Cyber Extortion Holding Ransom Your Character in Exchange for Bitcoin Money August 5, 2018 LIFARS is frequently called in to address cyber extortion. A popular recent variant is sextortion emails. In this scheme, an email is received falsely...
Blog Post Blockchain Technology: What You Need to Know April 29, 2020 The blockchain originated from Bitcoin. As the underlying technology of Bitcoin, it is essentially a decentralized database. It refers to...
Blog Post What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on...
Blog Post How the U.S. Cyber Insurance Market Is Performing? March 23, 2020 Since the 1990s, the acceleration of the development of insurance solutions for network security has gradually started and has been...
Blog Post Gangs Launch DDoS Attacks To Push Victims Into Paying Ransom November 11, 2020 Cybercriminals have perpetuated conducting fraudulent activities, but this time with another ransomware called SunCrypt. This new malicious software bars victims...
Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Blog Post USSS Increase in Extortionate Emails Alert February 19, 2019 The United States Secret Service has recently observed an increase in extortion email scams. These are not necessarily new methods...
Blog Post 6th Annual New York Metro Joint Cyber Security Conference (NYMJCSC 2019) September 12, 2019 Cyber Extortion – Presentation at NYMJCSC by LIFARS CEO Ondrej Krehel part 1. (Credit: Internet Society) Please join LIFARS founder...
Blog Post Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are...
Blog Post Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...