Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Law enforcement agencies in Europe this week announced the dismantling of a criminal network responsible for stealing payment card data and performing illegal transactions. [Read More]
Russian lawmaker’s son, already sentenced to 27 years in prison in the U.S. for cyber crimes, gets another 14-year prison sentence [Read More]
The idea of social media as a critical industry is a difficult concept, but the internet and all things cyber have become fundamental to the operation of the economy and society. [Read More]
Uber, the ride-sharing giant hit with a number of scandals in recent months, is now suspected of operating a program to hide nefarious tactics. [Read More]
UBoatRAT is a newly discovered custom remote access Trojan (RAT) used in attacks on personnel or organizations related to South Korea and the video gaming industry, Palo Alto Networks reveal. [Read More]
A newly discovered backdoor that has managed to infect over one thousand Android devices was designed to steal sensitive data from popular social media applications, Google reveals. [Read More]
22 year-old Karim Baratov, an immigrant from Kazakhstan who is now a Canadian national, pleaded guilty on Tuesday over charges related to hacking user accounts at Yahoo. [Read More]
UK-based Clarkson, one of the world’s largest shipping companies, informed the public that it suffered a data breach and hackers may release some data [Read More]
Bulletproof Coffee has sent out several payment card breach notifications in the past year. The company is having difficulties keeping hackers out [Read More]
U.S. authorities filed charges against three China-based hackers for stealing sensitive information from U.S. based companies, including sensitive data from Siemens industrial groups and accessing a high-profile email account at Moody’s. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
The emergence of decentralized marketplaces within the criminal ecosystem poses significant challenges for law enforcement agencies and private security vendors.
Jack Danahy's picture
Awareness is not enough. Companies also need to dedicate themselves to protecting users and eliminating the blind spots caused by unpatched systems and a lack of strong endpoint protection.
Alastair Paterson's picture
As the opportunity for payment card fraud grows, it’s safe to assume that more cybercriminals will take advantage of new, sophisticated online courses to get a piece of the pie.
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
While President Trump’s executive order has laid an impressive and hopeful foundation for a more secure nation, its focus on bolstering federal defenses against large-scale cyber attacks and nation-state cyber threats is still too narrow.
Alastair Paterson's picture
There’s a great deal of intelligence organizations can find on the deep and dark web, but it's important to remember that criminal activity isn’t limited to the dark web.
Josh Lefkowitz's picture
Most threat intel teams haven’t been conditioned to maintain a comprehensive understanding of how geopolitical factors can influence, emergent strains of malware, insider threats, or supply chain security vulnerabilities.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.