top of page
Gold Comet Blog


Top 10 Cybercrimes
While we’ve defined many lesser-known cybercrimes in Gold Comet's newsletter series, Cybercrime Defined, these ten still persist as the most frequently used strategies … because they still work! AI has opened a whole new land of opportunity for cybercriminals to discover novel and creative ways to steal your data!
Jun 113 min read
Â


15 Harmful Ways Info-Stealers Can Exploit Corporate Credentials
The average consumer loves new technology and doesn't worry about info-stealers, but here are 15 ways they can exploit your valuable data.
Sep 18, 20244 min read
Â


CaaS: The Rise of Cybercrime-as-a-Service
CaaS is a lucrative business model in which professional cybercriminals provide their tools and services to other criminals for a fee.
Sep 4, 20245 min read
Â


Cybersecurity Trends: Cyber Attacks and Global Cybercrime Today
An examination of trends in cyber attacks today, recent incidents, methods used, and the future of cybercrime.
Aug 21, 20246 min read
Â


Cybersecurity Terminology: Top 30 Cybersecurity Terms Cyber Professionals Should Know
stay updated with the latest cybersecurity terminology to protect and defend against cyber threats and build a secure, efficient system.
Jun 12, 20246 min read
Â


The Cost of Vulnerability: Global Cybercrime's Impact on Healthcare
The financial impact of cybercriminal activity on the global healthcare system is reaching stunning proportions.
Nov 8, 20235 min read
Â


Battling Cybercrime: Laws and Legal Actions in the Digital Age
The proliferation of technology and the Internet has opened the door to a surge in cybercrime, necessitating robust laws and legal actions.
Oct 25, 20233 min read
Â


In the News: Info-Stealers Obtain 400K Stolen Corporate Credentials
In the News: 400K corporate credentials stolen by infostealers and15 ways cybercriminals use stolen credentials to harm your enterprise.
Aug 2, 20233 min read
Â


5 Business Network Security Hacks
ere are five good hacks businesses can implement to enhance business network security and mitigate negative incidents.
Jun 7, 20232 min read
Â


CISA Ransomware Alert System Launch
CISA has developed and launched a ransomware alert system to test for security infrastructure vulnerabilities.
Mar 15, 20231 min read
Â


How Secure is Your Messaging?
A secure messaging platform is essential for collaborating on proprietary projects, protecting the transfer and storage of sensitive data.
Oct 28, 20203 min read
Â


Business Email Compromise (BEC) Attacks
Post on BEC, which tricks company employees using email into making sensitive business information accessible to cybercriminals.
Oct 23, 20202 min read
Â
bottom of page