Cybercrime Knowledge Hub

Understanding of Business Email Compromise (BEC) Attacks

BEC attacks are sophisticated scams involving email fraud where attackers masquerade as trusted entities to manipulate employees into transferring money or sharing sensitive information. These attacks exploit the trust and routine procedures within organizations, making them particularly insidious and effective.

Knowledge about Identity Theft

Although ID-theft is not a new crime, the magnitude of the problem has increased with society’s growing dependence on digital storing and sharing of personal information across all forms of services. This means that many people nowadays have access to information on the identities of others.

Insider Threats

Depending on the way an insider could constitute a risk for an organization, numerous definitions of insider threats exist. The most important point is that the definition of insider threat is contextual. Determining the internal threat is a best practice for each organization because it allows it to address the specifics of its working environment, beliefs, and resources that it believes are most vulnerable.

Familiarity with Denial-of-Service (DoS) Attacks

In the realm of cybersecurity threats, Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks occupy a notorious position. Characterized by their intent to disrupt and deny legitimate access to online services, these attacks overwhelm targeted networks, websites, or online services with a flood of internet traffic. This deluge of data, typically originating from a network of compromised computers, is designed to overload systems and render them inoperable, thereby denying service to legitimate users.

Understanding and Reporting Ransomware Attacks

Behaviors of ransomware have dramatically changed over the past years. In 2015, a shift in target was observed—operators started targeting businesses instead of individuals. This was made evident with a constant stream of reports of big companies succumbing to the threat. Apart from just infecting computers and mobile devices, ransomware also infects shared and removable drives and servers. Some families have also taken to encrypting chosen file types like tax-related and database files, ensuring bigger profits for their operators.

Familiarity with Phishing

Phishing is one of the oldest threats on the internet and a major vehicle for enabling the majority of cybercrime IC3’s latest cybercrime report shows that phishing has the highest victim count among cybercrimes reported in the US. Phishing involves executing cybercrimes by leveraging social engineering techniques.

Understanding of Crypto-jacking Attacks

In the evolving landscape of cyber threats, cryptojacking emerges as a silent yet pervasive hazard.

And, as cryptocurrencies continue to gain value and prominence, the incentive for cybercriminals to engage in crypto-jacking has surged, making understanding and awareness of this cyber threat more relevant than ever.

Initiating Action upon Detecting Hacking

The digital landscape is fraught with cybersecurity threats, making the recognition and management of hacking incidents a priority for individuals and organizations alike. Hacking, the unauthorized access to or manipulation of data or systems, can lead to significant data breaches, financial loss, and erosion of customer trust.

Understanding what constitutes a hacking attempt is the first line of defense in cybersecurity.

Knowledge of Main Challenges Faced When Reporting Cybercrime

Deep dive into the practical challenges in cybercrime reporting, from technical barriers to organisational hesitations. 

Learn more about strategies to streamline reporting and the benefits of early and accurate reporting.

Awareness of Relevant National Authorities

Overview of key national authorities related to cybercrime reporting in the EU. 

Learn more about the roles and responsibilities of these authorities and how they coordinate with EU-level bodies.