Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Several government websites in the US states of Ohio and Maryland had to be shut down Sunday after being hacked to display messages supporting the Islamic State group. [Read More]
In newly observed attacks, the SamSam ransomware that has been active for more than a year is demanding a whopping $33,000 to decrypt all affected machines in a network. [Read More]
The CIA had top-level intelligence last August that Russian President Vladimir Putin personally ordered an operation to help Donald Trump win the US presidential race, the Washington Post reported Friday. [Read More]
The Fireball malware detailed early this month might not have have had as much impact as originally reported, Microsoft claims. [Read More]
The Necurs spam botnet has switched back to distributing the Locky ransomware in a campaign featuring messages disguised as fake invoices, Cisco Talos security researchers reveal. [Read More]
A wave of "computational propaganda," largely driven by Russia, is impacting politics around the world by spreading misinformation designed to manipulate public opinion, researchers said Tuesday. [Read More]
Honda said June 21 that it had temporarily halted production at a plant in Japan after it suffered a cyberattack from the same ransomware that struck hundreds of thousands of computers worldwide last month. [Read More]
Drupal developers release security updates that patch several flaws, including one exploited in the wild in spam campaigns [Read More]
Hackers sponsored by the Russian government targeted election-related networks in 21 U.S. states, says the DHS [Read More]
Palestinian law enforcement agencies and other targets within Palestine were targeted in a spear phishing campaign delivering malware to remotely control infected systems, Talos researchers reveal. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Josh Lefkowitz's picture
Most threat intel teams haven’t been conditioned to maintain a comprehensive understanding of how geopolitical factors can influence, emergent strains of malware, insider threats, or supply chain security vulnerabilities.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.
Josh Lefkowitz's picture
Organizations seeking to obtain actionable intelligence from the Deep & Dark Web (DDW) should recognize that doing so creates risk and requires substantial expertise, resources, and time.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Alastair Paterson's picture
With elections coming up in the UK in June and Germany in September what type of cyber interference might we expect? And, more importantly, what steps can we take to mitigate risk?
Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.