Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Camelot, the company that runs the UK National Lottery, announced that approximately 26,500 customer accounts had been fraudulently accessed. [Read More]
A new variant of the Cerber ransomware has been delivered to victims via Google redirects and Tor2web proxies [Read More]
Europol admitted that confidential information on terror investigations were accidentally put online, as it launched a probe into what it called a "very serious incident." [Read More]
A ransomware attack on November 25 forced the San Francisco Municipal Transport Authority (SFMTA, or 'Muni') to close ticketing machines and open the gates to its railway system and let riders in for free. [Read More]
Over the last few days, Google has delivered a batch of warnings about potential government-backed attacks against numerous journalists, academics and activists. [Read More]
Scammers are abusing YouTube as a new way to promote backdoored phishing templates and provide potential buyers with information on how to use the nefarious software, Proofpoint researchers warn. [Read More]
The cybercriminals behind the notorious Cerber ransomware family have released three new versions of the malware this week, with the most notable change being the addition of new IP ranges in Cerber 5.0. [Read More]
Scores of customers from UK food delivery service Deliveroo have recently been charged for food they didn't order; food that was actually delivered to complete strangers. [Read More]
TeleCrypt, the file encryption ransomware that abuses Telegram API for communication, has had its encryption cracked just two weeks after the threat was originally detailed. [Read More]
Organizations in the healthcare sector continue to be the main targets of the Gatak Trojan, a piece of malware that can steal information and perform backdoor functions. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
This election cycle has shown that state actors may also believe that some data has more value if it is made public.
Alastair Paterson's picture
Employees who have reused corporate emails and passwords for personal use can put their employers at risk of account takeovers, credential stuffing and extortion attempts.
Scott Simkin's picture
While exploit kits are certainly contributing to the steady rise in the number of cyberattacks, in the end, the methods they use to infect endpoints and networks can be stopped provided the proper steps are taken.
Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Alastair Paterson's picture
As recent events have shown, you shouldn’t let your guard down because a threat actor or operation appears to have been shut down.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.