Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The annual cost of cybercrime has hit $600 billion worldwide, fueled by growing sophistication of hackers and proliferation of criminal marketplaces and cryptocurrencies, researchers said Wednesday. [Read More]
North Korean hackers are becoming more aggressive than their Chinese counterparts, FireEye warned, as it identified a Pyongyang-linked group as an "advanced persistent threat". [Read More]
A malicious RTF (Rich Text Format) document has been persistently displaying an alert asking users to enable macros, Zscaler security researchers have discovered. [Read More]
U.S. Department of Justice creates new cybersecurity task force to help find ways to combat cyber threats and become more efficient in this area [Read More]
Russia-linked cyberspy group APT28/Fancy Bear/Sofacy shifts focus from NATO countries and Ukraine to Central Asia and further east [Read More]
North Korean hacker group APT37 (aka Group123, Reaper, ScarCruft) has expanded the scope and sophistication of its operations [Read More]
More than 3 million new malware samples targeting the Android operating system were discovered in 2017, marking a slight decrease from the previous year, G Data reports. [Read More]
A malicious attack uses a multi-stage infection to deploy a tool capable of stealing passwords from various applications on the victim’s computer, Trustwave reports. [Read More]
SWIFT attacks: Russia’s Central Bank says one of the country’s financial institutions lost $6 million, and hackers attempted to steal $2 million from India’s City Union Bank [Read More]
Cyberattacks cost the United States between $57 billion and $109 billion in 2016, a White House report said, warning of a "spillover" effect for the broader economy if the situation worsens. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Alastair Paterson's picture
With better security practices both on an individual and organizational level, you can mitigate the risk of cryptocurrency fraud while remaining an active user.
Alastair Paterson's picture
The most technically sophisticated use detailed social engineering techniques, zero-day exploits and weaknesses in the supply chain.
Siggi Stefnisson's picture
I think it’s largely understood that the rise of a virtual, anonymized and easy-to-use payment system was a key factor in making ransomware the phenomenon it is today.
Lance Cottrell's picture
The internet drives much of the world’s intelligence gathering, but its rapid evolution and lack of flexible policy-making is affecting how analysts do their jobs.
Markus Jakobsson's picture
While there are no signs today of criminals consolidating and reselling data from different breaches, it is an obvious concern as the value-add of the packaging would be substantial.
Josh Lefkowitz's picture
Retailers need relevant, actionable intelligence that can help them gain a decision advantage over the threats and adversaries they face year-round -- not just during the holiday shopping season.
Alastair Paterson's picture
The holiday season is in full swing and once again we can expect to see a surge in cyber attacks targeting retailers and consumers.
Siggi Stefnisson's picture
When disaster strikes, cyber criminals are always right behind, ready to apply social engineering techniques to take advantage of both the victims and people wishing to help.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.