top of page
Gold Comet Blog


Top 10 Cybercrimes
While we’ve defined many lesser-known cybercrimes in Gold Comet's newsletter series, Cybercrime Defined, these ten still persist as the most frequently used strategies … because they still work! AI has opened a whole new land of opportunity for cybercriminals to discover novel and creative ways to steal your data!
Jun 113 min read
Â


Cybersecurity Incident Response in the DIB: Lessons for Enterprises
An effective incident response plan is essential for business operations, a vital component of modern enterprise incident management. The ability to detect, assess, and recover from a cyber breach quickly can make the difference between a minor disruption and a catastrophe.
Apr 245 min read
Â


15 Harmful Ways Info-Stealers Can Exploit Corporate Credentials
The average consumer loves new technology and doesn't worry about info-stealers, but here are 15 ways they can exploit your valuable data.
Sep 18, 20244 min read
Â


Why Consumers Should Care About Secure Data Storage - Post #100!
Cybercriminals are ramping up their attacks on personal and business secure data storage - you should care and implement mitigations NOW.
Jul 25, 20244 min read
Â


Understanding Whitelisting: A Cybersecurity Best Practice
This post explores the concept of whitelisting and its significance in enhancing security with privileged access management (PAM).
Jun 19, 20242 min read
Â


In the News: Info-Stealers Obtain 400K Stolen Corporate Credentials
In the News: 400K corporate credentials stolen by infostealers and15 ways cybercriminals use stolen credentials to harm your enterprise.
Aug 2, 20233 min read
Â


Gold Comet Wins New Patent Award – Protecting Information Exchange and Leakage
Gold Comet's new patent award protects information exchange and mitigates information leakage.
Feb 22, 20233 min read
Â


Business Email Compromise (BEC): Why Email Security is So Important
Business Email Compromise (BEC) is growing rapidly as cybercriminals become more sophisticated in their security breach strategies.
Jan 4, 20232 min read
Â


Email Hacker Threats Today: HYPERSCRAPE Malware
Hyperscrape, an email-scraping tool, allows attackers to steal emails from inboxes without leaving much evidence of the attack.
Sep 14, 20222 min read
Â


How Secure is Your Messaging?
A secure messaging platform is essential for collaborating on proprietary projects, protecting the transfer and storage of sensitive data.
Oct 28, 20203 min read
Â


Business Email Compromise (BEC) Attacks
Post on BEC, which tricks company employees using email into making sensitive business information accessible to cybercriminals.
Oct 23, 20202 min read
Â
bottom of page