NEWS - H1 2022 Cyber Observatory: over 850,000 alerts sent, mainly related to data found on the dark web. The type of data found: email, password, username, postal address, phone number and other valuable data for hackers. Read more 2022 CRIF Cyber Observatory - First semester
White Blue Ocean helps you manage your digital security and that of your customers, through a wide range of web monitoring solutions both for personal and business customers.
We monitor the dark web and the open web to manage your digital security.
alerts sent in 2021 related to personal data found on the dark web, including:
EMAILS / PASSWORDS / USERNAMES / CREDIT CARDS / PHONE NUMBERS / ADDRESSES
The glossary clarifies the meanings of the most important terms relating to online security and cybercrime.
Zero day is when there is a security flaw with software which is known about by the vendor but doesn’t yet have a patch in place to fix the flaw which opens the software up to exploitation. Codes are written by hackers to create malware which takes advantage of the vulnerability in order to compromise the computer system. This can result in personal and sensitive information being stolen, bad actors gaining control of a computer and providing them with access to contact lists which can be used by the bad actor to send spam emails potentially infecting further computers with malware.
In this modern world there is an app for everything. Easy access to a variety of free apps for our smartphones and tablets, with millions available on the Google Play Store*, gives cybercriminals an opportunity to find new ways of infiltrating our devices and getting hold of sensitive data. Since bad actors have established methods to get past the Google Play Store’s security scans put into place to protect its users, deceptively innocent looking applications containing malware known as droppers have entered the scene.Read more
Browser Extensions can improve the convenience, productivity, and efficiency of browsers; however, they are not always secure as they look and can pose a significant challenge to cybersecurity. As a matter of fact, extensions can be easily downloaded with just one click, typically have full access to the contents of any web page the user loads and can handle sensitive data. This has made extensions a valuable target for threat actors.Read more