Hacker contracts Illicit market economy

Hacker Contracts: The Economy Behind Illicit Markets

Hacker Contracts: The Economy Behind Illicit Markets Malicious actors often rely on each other to launch attacks. A carding ring that was recently dismantled by Russian authorities, for example, led to the arrest of 25 individuals who were working together.  … Read More

Featured Post
leaked credentials webinar

Preventing Account Takeover in E-Commerce And Retail​ – August 2020 Webinar

Preventing Account Takeover in  E-Commerce And Retail Webinar by David Hétu, Flare Systems and Pharid Jaffer Access the Video Digitalization, cloud based-services, and the rise of online marketplaces and services have increased the number of entry points for malicious actors … Read More

Featured Post
leaked credentials webinar

Exploring Leaked Credentials: Practical Guide To Account Takeovers Prevention​ – June 2020 Podcast

Podcast: Exploring Leaked Credentials A Practical Guide To Account Takeovers Prevention​ Stream the podcast now! About the Podcast: As the workplace has moved online and an increasing number of employees begin to work from home, the challenges to our data … Read More

Featured Post
phishing attack chain

Breaking up the Phishing Attack Chain

Breaking up the Phishing Attack Chain Phishing remains a popular attack method for malicious actors. This attack method is made possible by the wealth of services phishers can purchase on illicit markets: mass mailers, email lists, fake websites etc. Phishing … Read More

Featured Post
The Winners and Losers of the Empire Market Shutdown

The Winners and Losers of the Empire Market Shutdown

The Winners and Losers of the Empire Market Shutdown Empire Market was launched on the dark web in January 2018. By filling the void left by the shutdown of Alphabay and Hansa marketplaces in mid-2017, it grew into one of … Read More

Featured Post
The Winners and Losers of the Empire Market Shutdown

How To Identify The Next Major Cyber Threats through Job Postings

How to Identify the Next Major Cyber Threats Through Job Postings A significant challenge for security teams is to extract intelligence from open-source information. Malicious actors routinely post advertisements like the one below. This actor is offering up a method, … Read More

Featured Post
how phishing emails get to you

Why all the Spam? How Phishing Emails Get to You

How Phishing Emails Get to You A phishing attack is any communication (email, SMS, instant messaging) campaign launched by a malicious actor to steal personal data and credentials. Phishing attacks are one of the biggest threats to data security. According … Read More

Featured Post
ransomware attack blog

Ransomware and Supply Chains

The Low Hanging Fruit: Your Vendors And Partners Ransomware is a growing threat to any organization, government or business. In Canada alone, it is estimated that ransomware attacks and the associated downtime cost our economy CAD$2.4 billion in 2020. HOW … Read More

Featured Post
CRA new methods

Credential Stuffing Attacks And CRA

Credential Stuffing Attacks And CRA The Canada Emergency Response Benefit (CERB) is an essential part of the Canadian Federal Government response to the COVID-19 pandemic. With an estimated cost of over $71 billion dollars and limited vetting of applicants, the CERB program … Read More

Featured Post
hope 2020 flare systems

HOPE Conference 2020 VIDEO: Pricing and Mapping the Underground

Pricing and Mapping the Underground: HOPE 2020 Flare Systems’s David Hétu had the pleasure of speaking at H.O.P.E. (Hackers On Planet Earth) on July 31st this year on pricing and mapping the cybercrime underground.  Watch the On-Demand Recording Now! https://youtu.be/OW4a3qldytAHackforums are known … Read More

Featured Post