Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A Russian state-controlled broadcaster on Monday blamed hackers for the embarrassing leak online of the final episode of the BBC drama Sherlock a day before it was due to air. [Read More]
Barts Health NHS Trust in London suffered an unspecified 'IT attack' on January 13. Initial reports suspected it was a ransomware attack; but this has since been ruled out. [Read More]
A college student has admitted being the developer of a widely used keylogger known as “Limitless.” He faces 10 years in prison [Read More]
Gmail phishing attack: cybercriminals use cleverly designed URLs and they immediately access the hacked accounts [Read More]
A newly observed RIG exploit kit campaign leverages outdated versions of popular applications such as Flash, Internet Explorer, or Microsoft Edge to distribute the Cerber ransomware, Heimdal Security warns. [Read More]
An attack campaign using object linking and embedding (OLE) distribute an unknown keylogger disguised as a Silverlight update, hit a major financial services provider, Proofpoint researchers reveal. [Read More]
Hacker claims to have stolen 900 Gb of data from Israeli mobile forensics company Cellebrite [Read More]
The EyePyramid malware used to spy on important people in Italy is not very sophisticated, but it still allowed attackers to steal a lot of sensitive data for a long time [Read More]
A new variant of the Ploutus ATM (automated teller machine) malware was recently observed that could be adapted to target a wide variety of ATMs. [Read More]
Italian siblings Giulio Occhionero and Francesca Maria Occhionero have been charged with conducting a long-running cyber espionage campaign against Italian politicians, businessmen and Masons using EyePyramid malware. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
As recent events have shown, you shouldn’t let your guard down because a threat actor or operation appears to have been shut down.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Alastair Paterson's picture
Cyber situational awareness can provide insights into the people, processes and technology your adversaries use and turn those into an advantage.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.