Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Hard Rock Hotel & Casino Las Vegas said that hackers managed to access customer payment card data through card scraping malware installed on systems running the resort's payment card system. [Read More]
The US government is continuing its quest for greater authority in cyberspace in order to fight crime and protect national security. [Read More]
Operators of the CryptXXX ransomware made approximately $50,000 from the payments made to a single Bitcoin address between June 4 and June 21, 2016. [Read More]
Bart ransomware has the ability to encrypt users’ files without having to report to a C&C server first. [Read More]
MIRCOP Ransomware claims victim stole 48.48 Bitcoins and demands payback. [Read More]
The IRS has decided to shut down its e-File PIN tool after fraudsters continued to abuse it despite additional protections [Read More]
PunkeyPOS is Point-of-Sale malware that can grab information including account numbers, magnetic strip contents (tracks) from bank cards, and more. [Read More]
The most dramatic change in the ransomware landscape has been the emergence and growth of crypto ransomware. [Read More]
“Marcher” banking Trojan samples analyzed by PhishLabs target 66 organizations, but not in the United States [Read More]
Following weeks of relative silence, the Locky ransomware appears ready to storm unprotected computers once again, with a new infection campaign observed the same day that the Necurs botnet became active again. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Alastair Paterson's picture
Cyber situational awareness can provide insights into the people, processes and technology your adversaries use and turn those into an advantage.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.