Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Unpatched vulnerabilities in the McDonald’s website expose user passwords to phishing attacks [Read More]
The newly released CryptoSearch tool allows users to find exactly what files were encrypted, and optionally move them to another location before cleaning or formatting a system. [Read More]
A Russian state-controlled broadcaster on Monday blamed hackers for the embarrassing leak online of the final episode of the BBC drama Sherlock a day before it was due to air. [Read More]
Barts Health NHS Trust in London suffered an unspecified 'IT attack' on January 13. Initial reports suspected it was a ransomware attack; but this has since been ruled out. [Read More]
A college student has admitted being the developer of a widely used keylogger known as “Limitless.” He faces 10 years in prison [Read More]
Gmail phishing attack: cybercriminals use cleverly designed URLs and they immediately access the hacked accounts [Read More]
A newly observed RIG exploit kit campaign leverages outdated versions of popular applications such as Flash, Internet Explorer, or Microsoft Edge to distribute the Cerber ransomware, Heimdal Security warns. [Read More]
An attack campaign using object linking and embedding (OLE) distribute an unknown keylogger disguised as a Silverlight update, hit a major financial services provider, Proofpoint researchers reveal. [Read More]
Hacker claims to have stolen 900 Gb of data from Israeli mobile forensics company Cellebrite [Read More]
The EyePyramid malware used to spy on important people in Italy is not very sophisticated, but it still allowed attackers to steal a lot of sensitive data for a long time [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
By being aware of the latest tactics, techniques and procedures (TTPs), organizations can understand how to mitigate damage and thwart cyber attacks during the holidays.
Josh Lefkowitz's picture
Entering the Deep & Dark Web also requires highly-advanced operations security and technical skills. Not only is gaining access to these online communities extremely difficult, it is risky.
Alastair Paterson's picture
This election cycle has shown that state actors may also believe that some data has more value if it is made public.
Alastair Paterson's picture
Employees who have reused corporate emails and passwords for personal use can put their employers at risk of account takeovers, credential stuffing and extortion attempts.
Scott Simkin's picture
While exploit kits are certainly contributing to the steady rise in the number of cyberattacks, in the end, the methods they use to infect endpoints and networks can be stopped provided the proper steps are taken.
Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Alastair Paterson's picture
As recent events have shown, you shouldn’t let your guard down because a threat actor or operation appears to have been shut down.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?