“Air gapping,” or isolating certain systems by keeping them disconnected from the public internet, or any other networks, including your own, has for years been a gold-standard cybersecurity technique.Read More…

This categories having resources like, Blogs, News, and Whitepapers.
“Air gapping,” or isolating certain systems by keeping them disconnected from the public internet, or any other networks, including your own, has for years been a gold-standard cybersecurity technique.Read More…
With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts? Read More…
Vigilante wishes to highlight a threat actor or threat actor group on an exclusive Russian-language Dark Web forum that is currently advertising the Ransomware-as-a-Service (RaaS) known as “Smaug”. Although this type service is not entirely new, the Smaug RaaS platform is a particularly attractive option for lower-tier or unskilled cyber criminals to enter the Ransomware threat space, increasing the proliferation…
Vigilante wishes to highlight two more ransomware groups that have adopted the Maze Team model of extorting their victims to pay: NetWalker and Ako. Under the Maze model, once the group has the victim’s data in its possession, it demands two separate ransoms; the first ransom amount is for providing a decryption key and the second is to delete all the data they copied and exfiltrated before locking up the victims’ files.
Vigilante warns that over the last few weeks threat actor group Maze Team is claiming to have attacked at least two insurance companies with ransomware and may be eyeing additional insurance industry victims.
Vigilante found several malicious campaigns emanating from threat actors in the underground economy, which are targeting Canadian citizens who qualify for economic relief from the COVID-19 pandemic under Canada’s Economic Response Plan.
During this extended period of social distancing filled with increased online activity, I can’t help but reflect on all the user data that has been created, stored, hacked, exposed, bought, shared and sold over the last 10 years. Read more here or Link to published article
Prolific hacktivist group, Ghost Squad Hackers—also known as “GSH”— announced several new hacks of various government-affiliated sites and servers in a probable attempt to undermine public confidence in government at a time of universal unease due to the COVID-19 pandemic.
Vigilante discovered an emerging threat actor group attacking large online retailers using brute force checkers with large, frequently updated combo lists of login credentials.
Over the past week, Vigilante has observed an uptick in Deep and Dark Web (DDW) communities experiencing an increase in scams targeting DDW users, overwhelmed DDW moderators, and degraded webpage performance of popular DDW forums and marketplaces.