Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Fortinet released details on the top malware, ransomware, mobile malware, IPS events, botnets, and exploit kits targeting the healthcare industry in Q4 2016. [Read More]
A newly discovered Android ransomware variant that packs speech recognition capabilities demands that victims speak a code provided by the attackers to unlock their devices, Symantec researchers warn. [Read More]
Breach that may have affected many major organizations comes to light after nearly two years. Links found to Chinese APTs [Read More]
The Windows variant of the infamous Mirai Linux botnet is the offspring of a more experienced bot herder, possibly of Chinese origin, Kaspersky Lab security researchers warn. [Read More]
TeamSpy, the data-stealing malware that was associated with a decade-long cyber-espionage operation several years ago, has resurfaced in a new spam campaign. [Read More]
Lazarus-linked hackers behind attacks on banks worldwide attempted to trick investigators into thinking they speak Russian [Read More]
An Android Remote Access Trojan (RAT) used to target Israeli servicemen is part of a larger campaign that might not be associated with Hamas, as initially believed, security researchers have determined. [Read More]
Former sysadmin sentenced to 34 months in prison for hacking into systems of industrial facility and disrupting its operations [Read More]
Implementation bug allowed an attacker to create 370,000 Zcoins and make a profit of over $400,000 [Read More]
Ukrainian cybercriminal who sent heroin to Brian Krebs has been sentenced to 41 months in prison in the U.S. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Jack Danahy's picture
Protection against the effects of ransomware starts with a clear understanding of all of the means that attackers will use to implant that first malicious package.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Josh Lefkowitz's picture
It’s critical to recognize that there will always be virtual ways in which terrorists and other criminals can create threats that no border process or physical security program can stop.
Alastair Paterson's picture
It’s fairly typical for bad actors to escalate extortion-based campaigns during seasonal events when the stakes for targets are high.
Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
Joshua Goldfarb's picture
Let’s take a look at a few of the different ways in which people convince themselves that they do not need to understand the threat landscape they face and mitigate the risk it presents them with.
Adam Meyer's picture
Cyber threat intelligence is showing us is that most threats simply exploit a series of well-documented vulnerabilities and other weak points to move along the path of least resistance – and the most profit.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Alastair Paterson's picture
By being aware of the latest tactics, techniques and procedures (TTPs), organizations can understand how to mitigate damage and thwart cyber attacks during the holidays.