Cyber Defense Advisors

News

Identity Theft from 1965 Uncovered through Face Recognition

Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s death as an infant, and used the stolen identity to obtain Social Security benefits under both identities, multiple passports and state identification cards, law enforcement officials said. […] A new investigation was launched in 2020 […]

Cyber News, Cyber Threat Trends

Identity Theft from 1965 Uncovered through Face Recognition

Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s death as an infant, and used the stolen identity to obtain Social Security benefits under both identities, multiple passports and state identification cards, law enforcement officials said. […] A new investigation was launched in 2020 […]

Cyber News, Cyber Threat Trends

Identity Theft from 1965 Uncovered through Face Recognition

Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s death as an infant, and used the stolen identity to obtain Social Security benefits under both identities, multiple passports and state identification cards, law enforcement officials said. […] A new investigation was launched in 2020 […]

Cyber News, Cyber Threat Trends

Identity Theft from 1965 Uncovered through Face Recognition

Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s death as an infant, and used the stolen identity to obtain Social Security benefits under both identities, multiple passports and state identification cards, law enforcement officials said. […] A new investigation was launched in 2020 […]

Cyber News, Cyber Threat Trends

Microsoft Warns of Adversary-in-the-Middle Uptick on Phishing Platforms

Existing phishing-as-a-service platforms are increasingly incorporating adversary-in-the-middle capabilities

Cyber News, Cyber Threat Trends

Microsoft Warns of Adversary-in-the-Middle Uptick on Phishing Platforms

Existing phishing-as-a-service platforms are increasingly incorporating adversary-in-the-middle capabilities

Cyber News, Cyber Threat Trends

Microsoft Warns of Adversary-in-the-Middle Uptick on Phishing Platforms

Existing phishing-as-a-service platforms are increasingly incorporating adversary-in-the-middle capabilities

Cyber News, Cyber Threat Trends

Four in Five Cyber-Attacks Powered by Just Three Malware Loaders

ReliaQuest found that 80% of cyber intrusion campaigns used either QakBot, SocGholish or Raspberry Robin

Cyber News, Cyber Threat Trends

Four in Five Cyber-Attacks Powered by Just Three Malware Loaders

ReliaQuest found that 80% of cyber intrusion campaigns used either QakBot, SocGholish or Raspberry Robin

Cyber News, Cyber Threat Trends