Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Some services at global shipping and ecommerce giant Pitney Bowes disrupted after a file-encrypting ransomware infected some systems. [Read More]
USPS affiliate Click2Mail.com has started sending out notices to some of its users about a data breach that impacted their personal information. [Read More]
Anthony Tyler Nashatka, aka psycho, appeared in a US federal court on charges related to his involvement in a scheme aimed at defrauding victims of at least $1.4 million in cryptocurrency. [Read More]
Imperva says hackers obtained Cloud WAF customer data after they stole an AWS API key that gave them access to a database snapshot created for testing purposes. [Read More]
A recently uncovered highly targeted cyber-espionage platform that uses Tor for network communication has been targeting Russia and Eastern Europe. [Read More]
DCH Health System said key operations were back to normal 10 days after a ransomware attack encrypted information and prevented its hospital computer systems from communicating with each other. [Read More]
Magecart hackers have been gathering sensitive information from thousands of online shops after compromising top ecommerce platform and service provider Volusion. [Read More]
The BitPaymer ransomware operators were observed abusing a zero-day vulnerability in Apple’s iTunes for Windows to run code and evade detection. [Read More]
A citizen of Singapore has been charged in the United States for a large-scale cryptocurrency mining operation performed using stolen identity and credit card information. [Read More]
Spain's National Court is investigating a Spanish private security firm on suspicion it spied on Julian Assange on behalf of the US while he was inside the Ecuadorian embassy in London. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.