YouTube Scammers – Cryptocurrency Scams as a Business Model

YouTube Scammers – Cryptocurrency Scams as a Business Model

Hold Security profiles the gang, who is behind the cryptocurrency scam, that likely inspired the Twitter breach and the same scam that prompted Steve Wozniak to sue Alphabet Inc. over ineffective protection.

Hold Security identifies threat actors using 0-day vulnerability in Zyxel NAS devices

Hold Security identifies threat actors using 0-day vulnerability in Zyxel NAS devices

Hold Security identifies Russian-speaking threat actors abusing critical 0-day vulnerability within Zyxel NAS allowing execute malicious code bypassing system authentication.

We teamed up with Brian Krebs to alert CERT and vendor about the issue. Nearly 2 weeks later, Zyxel finally released a patch for some of their devices that they still support. Emotet gang is weaponizing these exploits to target IoT.

How the dark web works: What your security team needs to know

How the dark web works: What your security team needs to know

Want to learn more about how the Dark Web works and what all security professionals need to know?

Hold Security discovers hackers photoshopping images to reset 2FA!

Hold Security discovers hackers photoshopping images to reset 2FA!

Hold Security discovers hackers photoshopping images to reset 2FA!

Forbes reveals Marriott's breaches

Forbes reveals Marriott's breaches

Alex Holden, Hold Security’s CISO comments and contributes crucial information to the story.

Hold Security rates as a strong performer among threat intelligence providers in recent research report

Hold Security rates as a strong performer among threat intelligence providers in recent research report

MEQUON, Wis. – October 3, 2018 Hold Security announced today that Research firm Forrester recently identified and evaluated the 15 most significant providers for External Threat Intelligence, and Hold Security, LLC, ranked as a strong performer in that space. In today’s world, the impact of data security breaches intensifies as for-profit hackers mix with corporate- and state-sponsored hackers, making it paramount for companies to look at emerging cyber threats that are coming from outside of their perimeter.

Poor Equifax security

Poor Equifax security

Hold Security’s discovery of a critical password vulnerability within Equifax Argentina website paints a grim picture of the state of security within Equifax. Brian Krebs covers the details in his article.

How much are you worth to a hacker?

How much are you worth to a hacker?

How much are you worth to a hacker? Hold Security dove into the black market to put some numbers on it!

Your Biggest Online Security Risk Is You - THE WALL STREET JOURNAL.

Yahoo! confirms breach affecting 500 million users

Yahoo! confirms breach affecting 500 million users

Hold Security’s research into hackers selling stolen Yahoo! data is featured on the front page of the New York Times. The timeline of the hackers allegedly obtaining the stolen data. Their claims and goals discussed.

POS Vendor Breaches Discovered

POS Vendor Breaches Discovered

Hold Security identifies a group of hackers behind reported breach of Oracle’s MICROS POS along with nearly a dozen of other smaller POS vendors. Hackers targeted these POS vendors with the goal to gain access to their platform and to their customer installation. The mass abuse of POS devices goes to a new level of exploitation of vendors of POS and their support infrastructures. Forbes Magazine highlights the story.

1 2 3 4

Logo
Řešení Threat Intelligence Services Credential Integrity Service Domain Integrity Service Služby posuzování informační bezpečnosti Reakce na incident a vyšetřování
Telefon
+420 770 121 812
Email
info@hstechnology.cz
Sociální sítě
twitter linkedin
Naše kanceláře
Autorská práva © 2024 Hold Security