YouTube Scammers – Cryptocurrency Scams as a Business Model

YouTube Scammers – Cryptocurrency Scams as a Business Model

Hold Security profiles the gang, who is behind the cryptocurrency scam, that likely inspired the Twitter breach and the same scam that prompted Steve Wozniak to sue Alphabet Inc. over ineffective protection.

July 27, 2020
Read more
Hold Security identifies threat actors using 0-day vulnerability in Zyxel NAS devices

Hold Security identifies threat actors using 0-day vulnerability in Zyxel NAS devices

Hold Security identifies Russian-speaking threat actors abusing critical 0-day vulnerability within Zyxel NAS allowing execute malicious code bypassing system authentication.

We teamed up with Brian Krebs to alert CERT and vendor about the issue. Nearly 2 weeks later, Zyxel finally released a patch for some of their devices that they still support. Emotet gang is weaponizing these exploits to target IoT.

Feb. 24, 2020
Read more
How the dark web works: What your security team needs to know

How the dark web works: What your security team needs to know

Want to learn more about how the Dark Web works and what all security professionals need to know?

Nov. 20, 2019
Read more
Hold Security discovers hackers photoshopping images to reset 2FA!

Hold Security discovers hackers photoshopping images to reset 2FA!

Hold Security discovers hackers photoshopping images to reset 2FA!

Feb. 13, 2019
Read more
Forbes reveals Marriott's breaches

Forbes reveals Marriott's breaches

Alex Holden, Hold Security’s CISO comments and contributes crucial information to the story.

Dec. 11, 2018
Read more
Hold Security rates as a strong performer among threat intelligence providers in recent research report

Hold Security rates as a strong performer among threat intelligence providers in recent research report

MEQUON, Wis. – October 3, 2018 Hold Security announced today that Research firm Forrester recently identified and evaluated the 15 most significant providers for External Threat Intelligence, and Hold Security, LLC, ranked as a strong performer in that space. In today’s world, the impact of data security breaches intensifies as for-profit hackers mix with corporate- and state-sponsored hackers, making it paramount for companies to look at emerging cyber threats that are coming from outside of their perimeter.

Oct. 3, 2018
Read more
Poor Equifax security

Poor Equifax security

Hold Security’s discovery of a critical password vulnerability within Equifax Argentina website paints a grim picture of the state of security within Equifax. Brian Krebs covers the details in his article.

Sept. 14, 2017
Read more
How much are you worth to a hacker?

How much are you worth to a hacker?

How much are you worth to a hacker? Hold Security dove into the black market to put some numbers on it!

Your Biggest Online Security Risk Is You - THE WALL STREET JOURNAL.

Feb. 27, 2017
Read more
Yahoo! confirms breach affecting 500 million users

Yahoo! confirms breach affecting 500 million users

Hold Security’s research into hackers selling stolen Yahoo! data is featured on the front page of the New York Times. The timeline of the hackers allegedly obtaining the stolen data. Their claims and goals discussed.

Oct. 6, 2016
Read more
POS Vendor Breaches Discovered

POS Vendor Breaches Discovered

Hold Security identifies a group of hackers behind reported breach of Oracle’s MICROS POS along with nearly a dozen of other smaller POS vendors. Hackers targeted these POS vendors with the goal to gain access to their platform and to their customer installation. The mass abuse of POS devices goes to a new level of exploitation of vendors of POS and their support infrastructures. Forbes Magazine highlights the story.

Oct. 6, 2016
Read more
1 2 3 4

Logo
Solutions Threat Intelligence Services Credential Integrity Service Domain Integrity Service Information Security Assessment Services Incident Response and Investigation
Call
1 (414) 678 1414
Mail
info@holdsecurity.com
Social
twitter linkedin
Our offices
Copyright © 2024 Hold Security