Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The United States is confident of having killed Junaid Hussain, a top Islamic State cyber hacker and recruiter in a drone strike in Syria this week, US authorities said Thursday.
Caroline Kennedy, the US ambassador to Japan and daughter of late president John F. Kennedy, was criticized for using private email for official business.
President Barack Obama will send his national security advisor Susan Rice to Beijing this week, hoping to work through tensions over cyber attacks, the South China Sea and financial turmoil ahead of Xi Jinping's visit to Washington.
Two possible suicides may be linked to the hacking of adultery website Ashley Madison and the release of its membership data, Canadian police said.
Cyber spies most probably based in China have been snooping on Indian government bodies and universities since 2012 for sensitive material on its rival neighbor, according to FireEye.
The hackers behind the Ashley Madison breach compared the affair-seeking website to "a drug dealer abusing addicts" in an email exchange threatening to carry out more attacks.
Cybercriminals using thousands of hacked WordPress sites to deliver CryptoWall 3.0 via Neutrino exploit kit. One major Angler EK customer switched to Neutrino.
Hackers released what was purported to be a second batch of data from the affair-seeker website Ashley Madison, a report said Thursday.
The Internet Explorer zero-day patched this week by Microsoft has been used in watering hole attacks to deliver the PlugX RAT.
Japanese police will re-arrest the CEO of collapsed Bitcoin exchange MtGox on theft allegations, reports said.

FEATURES, INSIGHTS // Cybercrime

rss icon

Scott Gainey's picture
Organizations are asking the question – how much do I really need to spend on security in order to tip the scales in my favor? In order to answer that question you must first quantify the impact and risk of a cyber attack.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Marc Solomon's picture
Cybercrime-as-a-Service is increasing the sophistication and frequency of attacks to the point where they seem to be pervasive. When evaluating your approach to security in light of this increasingly popular approach to attacks, seek out solutions that are equally pervasive.
Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.