Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A new TorrentLocker campaign has been detected by Heimdal Security that is geographically focused on Sweden. [Read More]
A recently patched Adobe Flash Player vulnerability is being abused in a new malvertising campaign that redirects users to the Angler exploit kit (EK), Malwarebytes researchers warn. [Read More]
Fraudsters are leveraging technology to perpetrate fraud, but organizations are not succeeding in using data analytics for fraud detection. [Read More]
FrameworkPOS, a piece of malware used to capture payment card data from the memory processes running on Point-of-Sale systems, is being used in a new attack campaign, researchers at Anomali warn. [Read More]
An official inquiry has found serious shortcomings in how US presidential candidate Hillary Clinton in her former post as secretary of state managed the security of their emails. [Read More]
European authorities in France and Italy, in collaboration with Europol, shut down an international group responsible for large-scale ATM skimming and money laundering. [Read More]
Austrian aircraft parts maker FACC said that it has fired its chief executive of 17 years after cyber criminals stole some 50 million euros ($55.7 million) in a so-called "fake president" scam. [Read More]
More than 60 percent of all computer software installed in the Asia-Pacific in 2015 was unlicensed, the worst of any region, despite growing economies and anti-piracy efforts, an industry watchdog said Wednesday. [Read More]
A series of attacks carried out against banks in the Middle East in early May were using Macros and unique PowerShell scripts that are not commonly seen in crimeware campaigns, researchers at FireEye warn. [Read More]
As ransomware authors continue to increase their presence on the threat landscape, the group behind the DMA Locker malware is getting ready for massive distribution, Malwarebytes researchers warn. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.