Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The infamous Carbanak group of hackers has been using multiple tools in a series of attacks over the past several months, Trustwave security researchers reveal. [Read More]
Western Union admits failing to maintain anti-money laundering program and facilitating wire fraud, and agrees to pay $586 million to settle charges [Read More]
The number of data breaches disclosed in the United States increased by 40 percent in 2016 compared to the previous year, said ITRC and CyberScout [Read More]
Stanislav Lisov, an alleged Russian hacker wanted for fraud has been detained in Spain and jailed pending extradition to the United States. [Read More]
Following a series of ransom attacks against MongoDB and Elasticsearch databases in recent weeks, many users of CouchDB and Hadoop are now finding their databases ar under attack as well. [Read More]
Ukraine’s national power company Ukrenergo has confirmed that the December outage was caused by a cyberattack [Read More]
Secure email provider ProtonMail launches Tor hidden service to help users fight censorship and surveillance [Read More]
Newly discovered Quimitchin malware has been found infecting Mac OS X systems, in what security experts consider to be "the first Mac malware of 2017." [Read More]
A recently observed malware distribution campaign has been specifically devised to target users of the Chrome browser on Windows-based computers. [Read More]
The infamous Carbanak malware is now capable of using Google services for command and control (C&C) communication, Forcepoint security researchers warn. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Adam Meyer's picture
Cyber threat intelligence is showing us is that most threats simply exploit a series of well-documented vulnerabilities and other weak points to move along the path of least resistance – and the most profit.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Alastair Paterson's picture
By being aware of the latest tactics, techniques and procedures (TTPs), organizations can understand how to mitigate damage and thwart cyber attacks during the holidays.
Josh Lefkowitz's picture
Entering the Deep & Dark Web also requires highly-advanced operations security and technical skills. Not only is gaining access to these online communities extremely difficult, it is risky.
Alastair Paterson's picture
This election cycle has shown that state actors may also believe that some data has more value if it is made public.
Alastair Paterson's picture
Employees who have reused corporate emails and passwords for personal use can put their employers at risk of account takeovers, credential stuffing and extortion attempts.
Scott Simkin's picture
While exploit kits are certainly contributing to the steady rise in the number of cyberattacks, in the end, the methods they use to infect endpoints and networks can be stopped provided the proper steps are taken.
Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.