Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The DarkHotel APT, known mostly for targeting business travelers, spotted attacking political figures via new methods [Read More]
The Ninth U.S. Circuit Court of Appeals in San Francisco confirmed a lower court decision that gag orders included in FBI National Security Letters (NSLs) do not violate the First Amendment of the U.S. Constitution's free speech protections. [Read More]
A piece of malware dubbed SHELLBIND uses the Samba exploit dubbed SambaCry in attacks targeted at NAS devices [Read More]
An unknown hacker managed to hack the CoinDash official website during the company's ICO (Initial Coin Offering) and diverted over $7 million worth of Ethereum by replacing the official wallet address with their own. [Read More]
Two Iranians were indicted Monday in the United States with hacking a defense contractor and stealing sensitive software used to design bullets and warheads, according to the Justice Department. [Read More]
A Lithuanian man who allegedly swindled $100 million (87 million euros) from tech giants Google and Facebook must be extradited to the United States, a court ruled on July 17. [Read More]
A new variant of the CryptoMix ransomware was recently observed, appending the .EXTE extension to the targeted files, security researchers warn. [Read More]
Amendments to U.S. intelligence and defense policy bills include Russian and North Korean hacking, cybersecurity strategy, vulnerability disclosures, and information leaks [Read More]
Owner of cheating service Ashley Madison offers to pay $11.2 million to settle data breach lawsuits [Read More]
A recently observed feature-rich backdoor is capable of spying on its victim’s activities by recording full videos with the help of the "ffmpeg" application, Malwarebytes warns. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Alastair Paterson's picture
With elections coming up in the UK in June and Germany in September what type of cyber interference might we expect? And, more importantly, what steps can we take to mitigate risk?
Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.
Jennifer Blatnik's picture
By removing the allure of hacking, we can hopefully incentivize cybercriminals to instead use their skills in a positive way, to benefit not only themselves but also the greater good.
Alastair Paterson's picture
Bad actors will do whatever they can to take advantage of this potentially lucrative tax season – so beware the Ides of April.
Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.