Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Kedi RAT is a newly discovered remote access Trojan (RAT) capable of evading security scanners communicates with its command and control (C&C) server via Gmail. [Read More]
A new Windows 10 feature that makes the popular Linux bash terminal available for Microsoft’s operating system could allow for more malware families to target the operating system, Check Point researchers claim. [Read More]
Microsoft patches .NET zero-day vulnerability exploited to deliver FinFisher spyware to Russian users [Read More]
Hackers believed to be connected with North Korea have been targeting crypto-currency exchanges to obtain hard currencies for the Pyongyang regime, FireEye says. [Read More]
DMARC effectively whitelists the genuine emails from genuine domains, so that ISPs and receiving organizations (such as universities) can reject or block spoofed mails. [Read More]
Imperva detects thousands of attacks exploiting recently patched Apache Struts vulnerability to hack servers [Read More]
A new series of ransomware attacks targeting MongoDB databases has prompted the company to implement new data security measures. [Read More]
Justin Liverman, member of Crackas With Attitude hacker group, sentenced to 5 years in prison for hacking accounts of U.S. officials [Read More]
Apache Struts 2 vulnerability reportedly exploited to hack Equifax and gain access to customer data [Read More]
Industry professionals comment on the Equifax hack, which may affect as many as 143 million people [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.
Josh Lefkowitz's picture
Organizations seeking to obtain actionable intelligence from the Deep & Dark Web (DDW) should recognize that doing so creates risk and requires substantial expertise, resources, and time.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Alastair Paterson's picture
With elections coming up in the UK in June and Germany in September what type of cyber interference might we expect? And, more importantly, what steps can we take to mitigate risk?
Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.