Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Customers of Ecuador’s largest bank continued to experience service disruptions on Oct. 15th following a cyberattack on the institution several days earlier. [Read More]
Twitch has shared another update about the recent hack, and it claims to have determined that only a small fraction of users are affected and customer impact is minimal. [Read More]
Employing malicious Office files for malware delivery, the recently identified MirrorBlast campaign has low detection rates. [Read More]
Over two dozen nations resolved Thursday to battle collectively against the global and escalating threat posed by cyber-extortionists, following a Washington-led anti-ransomware summit. [Read More]
FBI, CISA, EPA and NSA issue a joint advisory to warn organizations in the water and wastewater sector of attacks targeting IT and OT systems. [Read More]
South Korea said Friday it’s asked Interpol for help to arrest two foreigners it alleges played a leading role in cyberattacks and large-scale extortion that targeted South Korean and U.S. companies. [Read More]
With 6,000 out of 30,000 observed clusters of activity, GandCrab emerged as the most active ransomware family wreaking havoc on the Windows ecosystem. [Read More]
An Israeli hospital was targeted Wednesday by a ransomware attack, officials said, with the state's cyber directorate calling it the first such attack on a hospital in the country. [Read More]
Hackers claim to have stolen 60 GB of data, including information on millions of customers, after breaching Acer India servers. [Read More]
A digital "disaster" in Germany, growing attacks in the United Arab Emirates and even Israel announcing a blitz underway: nations disclosed their struggle against ransomware attacks at a Washington-led anti-ransomware summit. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Derek Manky's picture
Botnets are becoming more malicious, sometimes able to create hundreds of thousands of drones that can attack a variety of machines, including Mac systems, Linux, Windows systems, edge devices, IoT devices, and so on.
Idan Aharoni's picture
Despite having different infrastructure, goals and methods, threat actors do not work in a vacuum. They feed off of each other.
Derek Manky's picture
How can organizations fight ransomware? The best solution is always prevention. Here are three tactics toward that goal.
Joshua Goldfarb's picture
The question of the importance of the state of a client device is a debate that has been around for a few years in the security field.
Idan Aharoni's picture
Plausible deniability provides a massive operational leeway to military operations in cyberspace, enabling governments to take actions without risking an all-out war.
Keith Ibarguen's picture
Leveraging humans for detection makes it hard for the attackers to predict whether or not their malicious emails will be identified and using technology to automate response provides scale and speed in resolution.
Idan Aharoni's picture
The fact that so many large and high-profile enterprises fall prey to ransomware attacks that in many cases does not pose any new technical challenge suggests that there are still many gaps that needs to be closed.
Derek Manky's picture
We tend to focus on the attack surface when it comes to cybersecurity, but the reality is, much like an iceberg, there’s so much more lurking beneath the surface.
Gordon Lawson's picture
Threat hunting must be non-attributable, while maintaining a clear audit trail to satisfy legal and governance requirements.
Idan Aharoni's picture
Fraudsters will determine who to target within the industry based on each service’s fraud prevention policies and maturity, rather than generally targeting the industry.