Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Kaspersky attributes more than 600 malware samples to a China-linked cyberspy group that has targeted Southeast Asia since at least 2012 [Read More]
Destructive cyber-attacks are increasing and are usually state-sponsored, analysis shows. Other than a few rare occurrences, most involve anything more than basic tools. [Read More]
British man said to be the hacker BestBuy admitted in a German court that he used the Mirai malware to hijack the routers of Deutsche Telekom customers [Read More]
Russia's parliament has voted to outlaw web tools that allow internet users to sidestep official bans of certain websites, the nation's latest effort to tighten controls of online services. [Read More]
Cybercriminals are testing a new component that can help the Emotet Trojan spread on internal networks [Read More]
A massive botnet that remained under the radar for the past five years managed to infect around half a million computers and allows operators to “execute anything on the infected host,” ESET researchers warn. [Read More]
A Russian man this week was sentenced to five years in prison for his involvement in the development and maintenance of the Citadel banking malware. [Read More]
A hacker was allegedly able to exploit a vulnerability in Ethereum wallet client Parity and steal over $30 million worth of crypto-currency. [Read More]
US and European police on Thursday announced the shutdown of two huge "dark web" marketplaces that allowed the anonymous online trade of drugs, hacking software and guns. [Read More]
FedEx says TNT is still working on restoring critical systems affected by the NotPetya malware, but some data may never be recovered [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
While President Trump’s executive order has laid an impressive and hopeful foundation for a more secure nation, its focus on bolstering federal defenses against large-scale cyber attacks and nation-state cyber threats is still too narrow.
Alastair Paterson's picture
There’s a great deal of intelligence organizations can find on the deep and dark web, but it's important to remember that criminal activity isn’t limited to the dark web.
Josh Lefkowitz's picture
Most threat intel teams haven’t been conditioned to maintain a comprehensive understanding of how geopolitical factors can influence, emergent strains of malware, insider threats, or supply chain security vulnerabilities.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.
Josh Lefkowitz's picture
Organizations seeking to obtain actionable intelligence from the Deep & Dark Web (DDW) should recognize that doing so creates risk and requires substantial expertise, resources, and time.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.