Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Nikkei discloses ransomware attack against its Singapore headquarters, saying customer data was likely impacted. [Read More]
The US Department of Justice has updated its policy regarding violations of CFAA to clearly state that ethical hacking should not be prosecuted. [Read More]
As Ukrainians flooded into Poland, Russian invaders, a hacking group aligned with the Kremlin sought to spread rumors that criminal gangs were waiting to harvest the organs of child refugees. [Read More]
Researchers have discovered a new approach being taken by phishers to increase victim engagement and confidence: the addition of an interactive chatbot. [Read More]
More than $15 million in illicit proceeds derived from the 3ve ad fraud scheme has been transferred from Switzerland to the US. [Read More]
The US government has warned that rogue IT workers from North Korea enable DPRK hacking operations and provide logistical support for its threat actors. [Read More]
Moises Luis Zagala Gonzalez, a citizen of France and Venezuela, has been charged with building, using, and selling ransomware. [Read More]
Tesla CEO Elon Musk says his deal to buy Twitter can’t move forward unless the company shows public proof that less than 5% of the accounts on the social media platform are fake or spam. [Read More]
Researchers at NCC Group create a tool for conducting a new type of Bluetooth Low Energy (BLE) relay attack that bypasses existing protections. [Read More]
The Conti ransomware gang that infiltrated some Costa Rican government computer systems has upped its threat, saying its goal is now to overthrow the government. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Landon Winkelvoss's picture
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Joshua Goldfarb's picture
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
Derek Manky's picture
Botnets have become a fixture in the threat landscape, and are in a state of evolution as they learn and use newer, more evolved cybercriminal attack techniques.
Derek Manky's picture
Organization must remain hyper-vigilant and upgrade their defenses as thoroughly and quickly as possible.
Joshua Goldfarb's picture
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
Landon Winkelvoss's picture
Similar to investigations that disrupt cyberattacks on retailers, the same tactics, techniques, and procedures (TTPs) can be leveraged against those that sell counterfeit or stolen goods.
Derek Manky's picture
While the sky just may be the limit (or actually, it may not be), when it comes to cybercriminals, three key areas where we expect to see more activity in the coming year are space, digital wallets and esports.
Derek Manky's picture
Public and private entities need to collaborate by sharing threat information and attack data to make attacks more difficult and resource-intensive for cybercriminals.
Jeff Orloff's picture
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.