There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to security risks. Where should security fit in?
In 2019, cybercriminals looked at the malicious mobile routines that worked in the past and adjusted these to make them more sophisticated, persistent, and profitable online and offline.
The notorious threat group Pawn Storm has been known to target high-profile entities, from governments to media for years. This research paper looks into the ways the group compromised email addresses and servers to facilitate credential phishing attacks.