top of page
Gold Comet Blog


Top 10 Cybercrimes
While we’ve defined many lesser-known cybercrimes in Gold Comet's newsletter series, Cybercrime Defined, these ten still persist as the most frequently used strategies … because they still work! AI has opened a whole new land of opportunity for cybercriminals to discover novel and creative ways to steal your data!
Jun 113 min read
Â


15 Harmful Ways Info-Stealers Can Exploit Corporate Credentials
The average consumer loves new technology and doesn't worry about info-stealers, but here are 15 ways they can exploit your valuable data.
Sep 18, 20244 min read
Â


Cryptocurrency and Cybercrime
Cryptocurrency and Cybercrime: As the popularity and value of cryptocurrency soar, so too does its appeal to cybercriminals.
Sep 11, 20246 min read
Â


CaaS: The Rise of Cybercrime-as-a-Service
CaaS is a lucrative business model in which professional cybercriminals provide their tools and services to other criminals for a fee.
Sep 4, 20245 min read
Â


The Cost of Vulnerability: Global Cybercrime's Impact on Healthcare
The financial impact of cybercriminal activity on the global healthcare system is reaching stunning proportions.
Nov 8, 20235 min read
Â


Can Video Games be Hacked?
Cybercriminals can use video games to gain easy access to personal information or to spread malware throughout a vulnerable home netw
Aug 30, 20232 min read
Â


In the News: Info-stealer Malware 101
This CyberWire podcast episode offers compelling food for thought as it delves into the practices and aftermath of info-stealer malware.
Aug 16, 20231 min read
Â


In the News: Info-Stealers Obtain 400K Stolen Corporate Credentials
In the News: 400K corporate credentials stolen by infostealers and15 ways cybercriminals use stolen credentials to harm your enterprise.
Aug 2, 20233 min read
Â


What is a Distributed Denial of Service (DDoS) Attack?
A Distributed Denial-of-Service (DDoS) Attack limits, restricts, or stops authorized users from accessing system resources: DDoS mitigation.
Jun 28, 20232 min read
Â


5 Business Network Security Hacks
ere are five good hacks businesses can implement to enhance business network security and mitigate negative incidents.
Jun 7, 20232 min read
Â


Email Hacker Threats Today: HYPERSCRAPE Malware
Hyperscrape, an email-scraping tool, allows attackers to steal emails from inboxes without leaving much evidence of the attack.
Sep 14, 20222 min read
Â
bottom of page