UK-based company TicketMaster, a ticket sales and distribution company, experienced a major breach as they announced on June 27. Upto 40,000 UK citizens might have been affected while their customer information are compromised. Many reports confirmed that TicketMaster was not directly breached or compromised, but a third-party supplier for their website was the one that […]
According to the 4iQ Identity Breach Report, 8.7 billion (detected and verified) raw identity-record data are on the surface, deep, and dark web in 2017, that is 182% increase compared to previous year. 44% of this data (around 3.8 billion) are usernames, passwords, and other credential information. You may hack through credential stuffing Credential stuffing […]
A recent survey conducted by Ponemon Institute reveals that 56% of companies have experienced a 3rd-party breach in 2017, which is an increase of 7% compared to previous year. Another survey conducted by Deloitte in 2016 was more depressive, reporting that 87% of organizations have experienced a disruptive incident with third-parties in the last 2-3 […]
Passive Cyber Threat Intelligence; The More You Look, the More You Find. So let me ask you a question. Have you ever lost something, like your glasses for example, and you are looking everywhere for them and you’re running around the house saying, “Has anybody seen my glasses?” and someone turns to you and says, […]
Biggest threat; There are more than 4 billion hacked emails/passwords available on the internet and underground forums. So, how attackers use hacked emails & passwords for malicious purposes? NormShield searches the internet from many sources for whether there is leaked e-mail of your employees or not. In the simplest form, email list of employees can […]
Data Leakage; Data is the most valuable asset that companies own and needs to be protected from the attackers. Data leakage can trigger disclosure of sensitive information, identity theft, and financial loss. Sensitive information can be used by hackers for future attacks. It may cause a serious problem if one of your employees PII is stolen […]
Data Leakage; There are various cyber threat intelligence venues and NormShield has started its exploration for some time now. One of the features it offers is to search paste portals for specific criteria (keywords, emails, domains, cc numbers, etc.) with of course a notification end.