Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Locky ransomware has changed its distribution method once again and is now using DLLs for infection. [Read More]
Millennium Hotels & Resorts North America is investigating a possible PoS breach at 14 hotels in the United States. The incident may be related to the recent Oracle MICROS breach [Read More]
Security researchers managed to successfully crack the newly spotted Alma ransomware and provide victims with the option to decrypt their files for free. [Read More]
A poorly conducted survey failed to provide enough information to come to any conclusion about the prevalence and effect of ransomware in UK universities. [Read More]
Wildfire, a recently observed piece of ransomware targeting mainly users in Belgium and the Netherlands, has generated roughly $80,000 in illicit revenue for its operators. [Read More]
Two browser hijackers were recently observed using a file-in-the-middle attack between browser shortcuts and the actual browser to redirect users to the sites of their choice. [Read More]
Cyberattacks targeting the World Anti-Doping Agency (WADA) have been linked by experts to the Russian threat actor known as Fancy Bear, APT28 and Pawn Storm [Read More]
A gang of foreign criminals stole millions of baht by hacking a Thai bank's ATM network in a theft believed linked to a similar one in Taiwan, police said. [Read More]
Hackers with apparent ties to Russia have conducted a series of cyber attacks on US media outlets including the New York Times, CNN reported Tuesday. [Read More]
Police in 28 European countries arrested 75 suspects for sharing child sex images on the internet while investigating 207 cases across the continent, Europol said. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Alastair Paterson's picture
As recent events have shown, you shouldn’t let your guard down because a threat actor or operation appears to have been shut down.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Alastair Paterson's picture
Cyber situational awareness can provide insights into the people, processes and technology your adversaries use and turn those into an advantage.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.