NormShield Blog

bitcoin exchange safe

Are Bitcoin Exchange Sites Safe?

Are Bitcoin Exchange Sites Safe and What Are the Vulnerabilities? Bitcoin Mania is all over the world. Bitcoin interest has expanded from Wall Street habitues to housewives in South Korea. Bitcoin trading became so popular that several major websites had to pause the admittance of new accounts. Cyber security is naturally a significant part of this […]

Cyber Insurance

Cyber Insurance; 7 Questions To Ask About Cyber Security

Cyber Insurance; Technology changes and develops so fast that hackers abilities and capabilities can become more comprehensive before you find out how to protect yourself against cyber risks. Considering fast and continuous development of hacking world, finding ideal ways to protect your company against cyber risks can be complicated. But, this doesn’t mean you are […]

Keynotes Phishing

Keynotes APWG Global Phishing Survey 2015-2016 – Malicious and Compromised Domains

Keynotes Phishing; APWG did an analysis of how many domain names were registered by phishers vs. phish that appeared on compromised (hacked) domains. (Why? Because both of them present different mitigation options for responders, and offer insights into how phishers commit their crimes.) A domain is flagged as malicious, if the domain was reported for […]

Keynotes Phishing

Keynotes APWG Global Phishing Survey 2015-2016 – Attack Motivation

Keynotes, Phishing; Attacks where money is handled or moves in commerce are typically designed to directly defraud victims. Attacks on social networks, e-mail systems usually are attempts to harvest credentials for further use. There are continued attacks on ISP’s and other Internet services companies to obtain Internet resources to launch further attacks. There are also […]

Keynotes APWG Global Phishing Survey 2015-2016 – Target Distribution

Keynotes; By using a large dataset of more than 250,000 phishing attacks detected in 2015 and 2016, APWG quantified cybercrime activity and understanding the patterns that lurk therein. They have learned more about what phishers have been doing, and how they have accomplished their schemes. Keynotes; TARGET DISTRIBUTION APWG counted unique target institutions during 2016, […]

Cyber Threat Intelligence

Passive Cyber Threat Intelligence

Passive Cyber Threat Intelligence; The More You Look, the More You Find. So let me ask you a question. Have you ever lost something, like your glasses for example, and you are looking everywhere for them and you’re running around the house saying, “Has anybody seen my glasses?” and someone turns to you and says, […]

wannacry

Things to know about WannaCry

Things to know about WannaCry; The goal of this notification is to try to give meaningful and concise answers for the popular #WannaCry attack What is WannaCry (WCRY)? How does it possibly harm my infrastructure? In April 2017, a hacker group called “TheShadowBrokers” leaked National Security Agency’s (NSA) hacking toolkit FUZZBUNCH, which included many working […]

Phishing Domain Detection, Machine Learning,

Phishing Domain Detection with Machine Learning

Phishing Domain Detection with Machine Learning; What is Phishing? Phishing is a form of fraud in which the attacker tries to learn sensitive information such as login credentials or account information by sending as a reputable entity or person in email or other communication channels. Typically a victim receives a message that appears to have […]

Malicious Javascript Code

How Companies Are Hacked via Malicious Javascript Code?

Malicious Javascript Code; JavaScript is dangerous. Maybe you’ve heard this sentence several times before. Actually, being dangerous or not dangerous is true under different circumstances. JavaScript can be dangerous if the proper precautions aren’t taken. It can be used to view or steal personal data even you don’t realize what’s going on. And since JavaScript […]