Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A Macedonian citizen suspected of being the operator of a carding website has been extradited to the United States [Read More]
Cybercriminals using Ransomware in attacks appear to be leveraging infected machines for additional nefarious purposes, such as launching distributed denial of service (DDoS) attacks, researchers at Invincea warn. [Read More]
The "Suckfly group" has launched attacks against government and commercial organizations in numerous countries, but the primary targets appear to be individuals and organizations located in India. [Read More]
TeslaCrypt, one of the largest ransomware threats over the past months, appears to have shut down, with its authors already releasing a master decryption key, researchers at ESET report. [Read More]
Cyber attackers are targeting the campaigns of Democratic and Republican presidential contenders, US Director of National Intelligence James Clapper said Wednesday. [Read More]
A hacker has offered for 167 million LinkedIn accounts for sale, of which 117 million include passwords - at the low price of around $2,200. [Read More]
Macro malware has recently returned to focus and is evolving, courtesy of tricks designed to better keep the malicious code hidden, Microsoft warns. [Read More]
Main developer of the Nuclear exploit kit is from Russia and renting the cybercrime tool generates a revenue of $100,000 per month [Read More]
Newly observed "Furtim" malware goes through great lengths to avoid being caught by security parties: it includes checks for 400 security products. [Read More]
Hackers once again took a swing at the Locky distribution network and replaced the malicious payload with a benign file, researchers at F-Secure report. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Alastair Paterson's picture
In 2015 we saw a surge in attacks against the financial services industry that involved extortion, social engineering, credential-stealing malware and sophisticated threats.
Wade Williamson's picture
Asking for security backdoors that only benefit the good guys is like asking for bullets that only hurt the bad guys. That’s simply not how encryption works.
Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.
Alastair Paterson's picture
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Marc Solomon's picture
Hackers are hijacking legitimate online resources to launch campaigns that ultimately show them the money.
Jason Polancich's picture
Competitive advantage is something that makes you better than the competition. Recent headlines show that hacking is everyday business for organizations just as much as it is for the cybercriminal.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.