Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Google is preparing to run an experiment in Chrome 86 as part of its fight against URL spoofing. [Read More]
The Chinese threat actor tracked by Kaspersky as CactusPete is not sophisticated, but its attacks are still relatively successful. [Read More]
Group-IB security researchers have identified a corporate espionage group, named RedCurl, that has launched 26 targeted attacks since 2018. [Read More]
The Israeli defence ministry said on Wednesday that it had foiled an attempted cyber attack by a foreign group targeting the country's defence manufacturers. [Read More]
Hackers have breached Michigan State University’s online store, gaining access to customer credit card numbers and other personal information, the university said. [Read More]
Zero-day vulnerabilities in Internet Explorer and Windows have been chained by a threat actor, presumably DarkHotel, in attacks aimed at South Korea. [Read More]
The SANS Institute has disclosed a security incident which resulted in 28,000 records of personally identifiable information (PII) being forwarded to an unknown email address. [Read More]
A 350% increase in phishing websites was reported in the first quarter of the year, many targeting hospitals and health care systems and hindering their work responding to the COVID-19 pandemic, the U.N. says. [Read More]
The U.S. Treasury Department has fined Capital One $80 million for careless network security practices that enabled a hack that accessed the personal information of 106 million of the bank’s credit card holders. [Read More]
Intel is investigating reports that a claimed hacker has leaked 20GB of data coming from the chip giant, which appear to be related to source code and developer documents and tools. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Justin Fier's picture
CISA has recently designated many cyber security positions ‘essential roles', and our understanding of essential businesses and essential employees will continue to change as the pandemic evolves.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
The holidays are also a bonanza for cybercriminals whose own sales and purchases of contraband on the dark web mirror the one-day-only specials of their consumer-facing counterparts.
Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.