• A hand holding a smart phone with a network of dots in the background, depicting the threat of telecom cyber attacks.

    Are Telecoms the Most Popular Target of Cyber-Attacks in 2021?

    Recent headlines have focused on data breaches of social media platforms, but the frequency and impact of these attacks pale in comparison to those in cyber-criminals’ favorite industry: telecommunications. Cyber-attacks on telecoms are popular because their databases carry detailed information on millions of customers. A successful telecom data breach could yield contact details, social security…

    By Cognyte CTI Research Group
    Nov 09 2021 · 3 Min Read
  • A blue background with a lot of bitcoin coins.

    5 Reasons Why Criminals & Terrorists Turn to Cryptocurrencies

    In this blog, Cognyte presents the appeal of cryptocurrency to criminals and terrorists, outlines the challenges facing security and law enforcement, and explains how Cognyte’s solution can help overcome these challenges and track down those behind illicit crypto transactions.

    By Tom Sadon, Director of Product Marketing
    Nov 02 2021 · 7 Min Read
  • 2021 Milipol Innovation Awards2

    Cognyte’s Blockchain Analytics Solution Wins the 2021 Milipol Innovation Awards

    Cognyte is honored and humbled to announce that its revolutionary blockchain analytics solution has been selected as a winner of the 2021 Milipol Innovation Awards. The contest took place as part of the Milipol Paris event, a leading event for security that hosts a global audience of tens of thousands of members of the security…

    By Tom Sadon, Director of Product Marketing
    Oct 26 2021 · 4 Min Read
  • A stack of resumes on a table amid the LinkedIn data breach 2021.

    2021 LinkedIn breach: cybercriminals are the new headhunters

    The fact that multiple databases of stolen records are shared for free on Dark Web platforms is not new. Stolen data can be used for various types of attacks, including spear-phishing, random malspam campaigns, etc. But a new, concerning data breach trend is emerging. Across Dark Web forums, services offer large-scale data filtered by categories,…

    By Cognyte CTI Research Group
    Oct 21 2021 · 4 Min Read
  • A person pressing a button on a circuit board while ensuring the security of credit cards leaked to the dark web.

    1 Million Leaked Credit Cards on Dark Web – 2021

    Details of 1 million stolen credit cards were recently shared on the dark web, free of charge, hoping to draw hackers to a new card marketplace. Learn about the new marketplace and the top email address domains that were shared.

    By Cognyte CTI Research Group
    Aug 12 2021 · 2 Min Read
  • An image of the earth with a blue and purple logo.

    Ransomware attack statistics 2021 – Growth & Analysis

    Read insights on the state of ransomware attacks in 2021 from our Cyber Threat Intelligence Research Group. Learn about greatest cybersecurity risks & who are targeted.

    By Cognyte CTI Research Group
    Aug 08 2021 · 2 Min Read
  • A blue sphere with a padlock on it, representing security and vulnerability management in the 2021 CVE report.

    Top CVE Threats of 2021

    Must haves for Security Analytics platforms One of the biggest challenges of cyber security teams is to have a good vulnerability management policy, since it is practically impossible to patch every vulnerability out there. Cognyte scoured the Deep and Dark Web to discover the most popular CVEs among threat actors during the last year. We…

    By Cognyte CTI Research Group
    Aug 04 2021 · 4 Min Read
  • A blue and purple background with the words cisco cisco cisco cisco cisco .

    What’s Driving the Move to Open Platforms for Security Analytics

    Security organizations are still struggling to tap the full potential of the data they have access to, preventing them from making rapid, data-driven decisions.- and as a result are moving to open, modern platforms for security analytics.

    By Ohad Oron, VP Product Management
    Mar 25 2021 · 4 Min Read
  • An image of the earth with a blue and purple logo.

    2020 was the year ransomware evolved – key findings from Cognyte’s Cyber Threat Intelligence report

    2020 was the year ransomware evolved. From data encryption to data exfiltration – ransomware groups are adopting the “double extortion” tactic to increase chances of a payout. Cognyte’s CTI research group analyzed 1,112 ransomware attacks carried out by 21 ransomware groups during 2020 – all of which involved data exfiltration to increase ransomware payouts.

    By Cognyte CTI Research Group
    Mar 23 2021 · 3 Min Read
  • A blue background with a lot of bitcoin coins.

    The dark side of cryptocurrencies and what can be done about it

    In early February 2021, many of us took note when Tesla bought $1.5 billion in Bitcoin and announced that going forward it would accept cryptocurrency as payment. Cryptocurrencies, such as Bitcoin, Ethereum, Ripple, Bitcoin Cash, Monero, and others, are no passing phase, empty buzzword, or the esoteric interest of tech savvy enthusiasts. To the contrary,…

    By Tom Sadon, Director of Product Marketing
    Mar 14 2021 · 5 Min Read
5 / 6