Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A member of the hacker group that breached Yahoo in 2012 has been sentenced to 2 years in prison in the UK [Read More]
Spam email volumes have increased significantly this year, being comparable to the record levels observed in 2010, mainly because of the increased activity of the Necurs botnet, Cisco Talos researchers believe. [Read More]
Hacker Ardit Ferizi, who helped the Islamic State group by providing stolen personal data on more than 1,000 US government and military workers was sentenced to 20 years in prison. [Read More]
File types used by attackers to deliver ransomware include JavaScript, VBScript, and Office files with macros, all coded in ways meant to evade detection from traditional security solutions. [Read More]
Kaspersky details biometric skimmers and other methods that can be used by cybercrooks in ATM attacks [Read More]
The ultimate goal for many of IoT-focused malware is to build strong botnets in order to launch distributed denial of service (DDoS) attacks, Symantec researchers warn. [Read More]
Mobile malware from the Xiny family of Android Trojans are capable of infecting the processes of system applications and of downloading malicious plug-ins into the infected programs. [Read More]
EFF publishes report to warn police and courts that IP addresses should not be considered a reliable indicator of identity or location [Read More]
The people who launched a 665 Gbps DDoS attack against Brian Krebs appear to have targeted hosting provider OVH in attacks totaling 1 Tbps [Read More]
The actor behind the Ursnif banking Trojan has been using new evasive macros in their latest infection campaign, demonstrating continuous evolution of tools and techniques. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Alastair Paterson's picture
As recent events have shown, you shouldn’t let your guard down because a threat actor or operation appears to have been shut down.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Alastair Paterson's picture
Cyber situational awareness can provide insights into the people, processes and technology your adversaries use and turn those into an advantage.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.