Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Cybercriminals are abusing stolen or newly created PayPal accounts to send spam emails that link to the Chthonic banking Trojan, Proofpoint researchers warn. [Read More]
Presidential Policy Directive (PPD-41) sets forth principles governing the Federal Government’s response to any cyber incident, whether involving government or private sector entities. [Read More]
Kimpton Hotels & Restaurants investigating possible payment card breach following reports of unauthorized charges [Read More]
Researchers at Arbor Networks managed to crack the heavy obfuscated domain generation algorithm (DGA) of Mad Max, a targeted Trojan that has created a botnet of infected machines in sixteen countries. [Read More]
Jihadist groups use a variety of digital tools and online services that allow them to maintain a strong online presence, while also helping them remain undetected by adversaries, a recent report from Flashpoint reveals. [Read More]
The India-linked threat actor known as Patchwork or Dropping Elephant is targeting more than just government-associated organizations, Symantec researchers say. [Read More]
While a series of experts pointed the finger at Russia for a breach the Clinton campaign, others urged caution. [Read More]
Europol has declared war on ransomware with the launch today of its 'no more ransom' initiative. [Read More]
The Federal Bureau of Investigation said Monday it was investigating the "cyber intrusion" at the Democratic National Committee after internal emails were leaked showing party leaders sought to undermine the campaign of Bernie Sanders. [Read More]
The actor behind the Kovter Trojan has come up with a new persistence mechanism, and is masquerading the malware as a Chrome update, Microsoft security researchers warn. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Alastair Paterson's picture
Cyber situational awareness can provide insights into the people, processes and technology your adversaries use and turn those into an advantage.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?