Your cyber intelligence source

Know your enemy #3: Cybercrime Inc.

Know your enemy #3: Cybercrime Inc.

Online and offline criminals are mimicking big businesses, setting up corporate structures and offices to make operations more efficient and to act as cover. Organised crime researcher, lecturer and consultant Chris Allen explains that this level of sophistication means we all need to be wary

In terms of nefarious activities, fraud and cybercrime go hand in hand. They share the same objectives: relieving people or businesses of their earnings. It’s just the methods of execution that differ.

Research by Professor David Wall at Leeds University, published recently in the Trends in Organised Crime journal, highlights a trend of criminals looking like real companies, focusing on the activities of a specific outfit: a DDOS Stresser service called StressSquadZ.

Upcoming Events


How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image