Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

While Lost Door is not new malware, it easily customizable and consequently "can be hard to detect and protect against, posing a challenge to IT administrators." [Read More]
The Qatar National Bank (QNB) may not be the only bank hacked by Turkish far-right group Bozkurtlar, according to Kaspersky Lab. [Read More]
In this podcast, Mike Hanley, Director of Duo Labs at Duo Security, talks about the state of security in the healthcare sector and why hospitals are such a prime target for ransomware attacks. [Read More]
By February 2017, Microsoft warned that both Microsoft Edge and Internet Explorer will block SHA-1 signed TLS certificates. [Read More]
The Board of Water and Light (BWL) in Lansing, Michigan, was struck by ransomware on Monday, April 25. [Read More]
Nikita Kuzmin, the creator of the Gozi malware, has been sentenced to time served and ordered to pay $7 million [Read More]
Jeffrey Wallis of Noble Markets said the news about the creator of Bitcoin doesn't matter. [Read More]
Researchers from Fox-IT have discovered that attackers are brute forcing their way into remote desktop servers to install and activate ransomware in corporate environments. [Read More]
Craig Wright identified himself as the creator of Bitcoin following years of speculation about who invented the pioneering digital currency. [Read More]
Researchers from Intel Security discovered a piece of malware dubbed "Dynamer" that is taking advantage of a Windows Easter Egg called “God Mode” to gain persistency on an infected machine. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Alastair Paterson's picture
In 2015 we saw a surge in attacks against the financial services industry that involved extortion, social engineering, credential-stealing malware and sophisticated threats.
Wade Williamson's picture
Asking for security backdoors that only benefit the good guys is like asking for bullets that only hurt the bad guys. That’s simply not how encryption works.
Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.
Alastair Paterson's picture
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.