Quantifying the cybersecurity risk from BEC (Business email compromise)

Understanding the source of Business email compromise is only the first step. The next challenge is quantifying the risk to an enterprise when employee email accounts appear in one, two, or even multiple breaches. A single exposure might reveal basic credentials, but repeated compromises across different platforms often provide attackers with a fuller picture—combining passwords, …

Why Business Emails Get Compromised—Even Without Phishing Clicks or Malware

A common question in cybersecurity circles is: How can business email accounts be compromised even when the user never clicks a phishing link or downloads malware? To explore this, we analyzed 50,000 email addresses from across Asia Pacific, New Zealand, and Australia. Each address was checked against HaveIBeenPwned.com to determine whether it had been exposed, …

Why Attack Duration Is a Powerful Indicator of Malicious Intent

WatchdogCyberdefense.com dataset shows that the Top 10 IPs have been seen attacking our clients for the LONGEST time: In contrast to one-off or bursty traffic patterns, sustained attacks often involve repeated actions over an extended period, aiming to overwhelm, infiltrate, or persist within a target system. Persistence Signals Intent Most legitimate users, bots, and even …

DarkCloud Stealer: Inside a Sophisticated Malware Campaign Using AutoIt

Introduction Unit 42 researchers have recently uncovered an advanced phishing campaign leveraging DarkCloud Stealer, an information-stealing malware active since 2022. This malware uses complex evasion techniques, including AutoIt scripting, to bypass security mechanisms and extract sensitive user data. Here’s a breakdown of how this stealthy malware operates and what you can do to protect your …