Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A series of attacks carried out against banks in the Middle East in early May were using Macros and unique PowerShell scripts that are not commonly seen in crimeware campaigns, researchers at FireEye warn. [Read More]
As ransomware authors continue to increase their presence on the threat landscape, the group behind the DMA Locker malware is getting ready for massive distribution, Malwarebytes researchers warn. [Read More]
Microsoft has detailed some of the steps it is taking to combat terrorism online, which include removing terrorist content from its services and partnering with others to meet the challenges presented by terrorists’ use of the Internet. [Read More]
Armed with fake credit card details from South Africa's Standard Bank, the thieves hit 1,400 convenience store ATMs in a coordinated attack earlier this month. [Read More]
A Macedonian citizen suspected of being the operator of a carding website has been extradited to the United States [Read More]
Cybercriminals using Ransomware in attacks appear to be leveraging infected machines for additional nefarious purposes, such as launching distributed denial of service (DDoS) attacks, researchers at Invincea warn. [Read More]
The "Suckfly group" has launched attacks against government and commercial organizations in numerous countries, but the primary targets appear to be individuals and organizations located in India. [Read More]
TeslaCrypt, one of the largest ransomware threats over the past months, appears to have shut down, with its authors already releasing a master decryption key, researchers at ESET report. [Read More]
Cyber attackers are targeting the campaigns of Democratic and Republican presidential contenders, US Director of National Intelligence James Clapper said Wednesday. [Read More]
A hacker has offered for 167 million LinkedIn accounts for sale, of which 117 million include passwords - at the low price of around $2,200. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?