Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Cyber espionage group known as Bronze Butler and Tick, which researchers linked to China, continues to target Japan using custom malware and a zero-day [Read More]
Pizza Hut hacked. Users who placed an order on the website or via the mobile app may have had their credit card data stolen [Read More]
Sample data provided by scammers claiming to have hacked Equifax may have come from another company’s unprotected QA servers [Read More]
41 Hyatt hotels in more than a dozen countries hit by payment card breach. This is the second breach discovered by the company within two years [Read More]
Websites of credit reporting agencies Equifax and TransUnion redirected users to malware, adware and scams due to a third-party web analytics script [Read More]
Increasing number of organizations moved to Office 365, but many haven’t migrated due to security concerns, including ransomware and phishing [Read More]
Equifax website that allows consumers to obtain their credit report was hacked and it redirected users to sites serving adware and scams [Read More]
Botnets are widespread worldwide, serving whichever purpose they were designed to, and the United States is one of the largest sources of botnet attacks. [Read More]
A recently discovered DNSMessenger campaign is abusing compromised U.S. state government servers to host malware, Cisco Talos security researchers say. [Read More]
Sensitive data about Australia's F-35 stealth fighter and P-8 surveillance aircraft programs were stolen when a defense subcontractor was hacked using a tool widely used by Chinese cyber criminals, officials said. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Jennifer Blatnik's picture
If the rest of the community would give hackers more of a chance before writing them off as evildoers, there would potentially be more incentives for capable people to go into the white hat hacking business.
Alastair Paterson's picture
The emergence of decentralized marketplaces within the criminal ecosystem poses significant challenges for law enforcement agencies and private security vendors.
Jack Danahy's picture
Awareness is not enough. Companies also need to dedicate themselves to protecting users and eliminating the blind spots caused by unpatched systems and a lack of strong endpoint protection.
Alastair Paterson's picture
As the opportunity for payment card fraud grows, it’s safe to assume that more cybercriminals will take advantage of new, sophisticated online courses to get a piece of the pie.
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
While President Trump’s executive order has laid an impressive and hopeful foundation for a more secure nation, its focus on bolstering federal defenses against large-scale cyber attacks and nation-state cyber threats is still too narrow.