Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

UK-based Clarkson, one of the world’s largest shipping companies, informed the public that it suffered a data breach and hackers may release some data [Read More]
Bulletproof Coffee has sent out several payment card breach notifications in the past year. The company is having difficulties keeping hackers out [Read More]
U.S. authorities filed charges against three China-based hackers for stealing sensitive information from U.S. based companies, including sensitive data from Siemens industrial groups and accessing a high-profile email account at Moody’s. [Read More]
New variant of Mirai malware targets ZyXEL devices using recently disclosed default credentials [Read More]
Imgur rushes to notify users after learning that hackers stole data associated with at least 1.7 million accounts back in 2014 [Read More]
The Necurs botnet, the world's largest spam botnet, is delivering a new version of the Scarab ransomware in a new wave of attacks start started in late November 2017. [Read More]
Two US states are investigating Uber's cover-up of a hack at the ride-sharing giant that compromised the personal information of 57 million users and drivers. [Read More]
Saudi authorities said Monday they had detected an "advanced" cyber attack targeting the kingdom, in a fresh attempt by hackers to disrupt government computers. [Read More]
Uber said that hackers accessed the personal data of 57 million of its users in a breach that had been covered up by the company for more than a year. [Read More]
A newly observed variant of the macOS-targeting Proton malware is spreading through a blog spoofing that of legitimate security company Symantec. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.
Josh Lefkowitz's picture
Organizations seeking to obtain actionable intelligence from the Deep & Dark Web (DDW) should recognize that doing so creates risk and requires substantial expertise, resources, and time.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Alastair Paterson's picture
With elections coming up in the UK in June and Germany in September what type of cyber interference might we expect? And, more importantly, what steps can we take to mitigate risk?
Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.