Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

File types used by attackers to deliver ransomware include JavaScript, VBScript, and Office files with macros, all coded in ways meant to evade detection from traditional security solutions. [Read More]
Kaspersky details biometric skimmers and other methods that can be used by cybercrooks in ATM attacks [Read More]
The ultimate goal for many of IoT-focused malware is to build strong botnets in order to launch distributed denial of service (DDoS) attacks, Symantec researchers warn. [Read More]
Mobile malware from the Xiny family of Android Trojans are capable of infecting the processes of system applications and of downloading malicious plug-ins into the infected programs. [Read More]
EFF publishes report to warn police and courts that IP addresses should not be considered a reliable indicator of identity or location [Read More]
The people who launched a 665 Gbps DDoS attack against Brian Krebs appear to have targeted hosting provider OVH in attacks totaling 1 Tbps [Read More]
The actor behind the Ursnif banking Trojan has been using new evasive macros in their latest infection campaign, demonstrating continuous evolution of tools and techniques. [Read More]
Two US lawmakers who are members of their respective intelligence committees said Thursday that a spate of recent cyber attacks suggests Russia is trying to disrupt the November election. [Read More]
Twitter saw a jump in official requests to remove posts in the first half of this year, the company said Wednesday. [Read More]
A Washington Post editorial arguing for the prosecution of intelligence leaker Edward Snowden has sparked an outcry in the media community -- including from some of the newspaper's own journalists. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Alastair Paterson's picture
As recent events have shown, you shouldn’t let your guard down because a threat actor or operation appears to have been shut down.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Alastair Paterson's picture
Cyber situational awareness can provide insights into the people, processes and technology your adversaries use and turn those into an advantage.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.