Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The carding shop says it plans to close operations on February 15, 2021. [Read More]
The European Union’s drug regulator said that COVID-19 vaccine documents stolen from its servers by hackers have been not only leaked to the web, but “manipulated.” [Read More]
The company sued two individuals for using browser extensions to scrape user profiles and other information from its website. [Read More]
Over 40 scam groups leverage the Classiscam scheme in Russia, the U.S., and Europe, and in 2020 they made $6.5 million. [Read More]
According to a Wall Street Journal report, TikTok used a banned tactic to bypass the privacy safeguard in Android to harvest unique identifiers from millions of mobile devices. [Read More]
Personal information on approximately 390,000 Capcom customers, business partners and other external parties possibly compromised in cyberattack. [Read More]
The Accellion service involved in the Reserve Bank of New Zealand breach is called FTA (File Transfer Application) and is used for file sharing. [Read More]
The stolen documents were related to Pfizer and BioNTech’s COVID-19 vaccine candidate. [Read More]
SolarLeaks is offering to sell — for tens and even hundreds of thousands of dollars — files allegedly obtained as a result of the SolarWinds breach. [Read More]
The Rogue malware can exfiltrate user data from Android devices and install additional payloads. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Joshua Goldfarb's picture
For any fraud detection solution to be practical, it must be easily integrated into security and fraud operations.
Derek Manky's picture
2020 has taught us to revisit the practice of inspecting encrypted traffic. These are all standard security protocols to step up in light of what cybercriminals are doing now.
Idan Aharoni's picture
With law enforcement’s ability to adapt, showing consistent results despite cybercriminals’ adoption of new technologies, as well as the increase in awareness of cyber attacks, there’s still a room for optimism – not only for the next year, but also for the next decade.
Joshua Goldfarb's picture
Facts, data, and evidence are extremely important to properly detecting, preventing, and investigating both security incidents and fraud incidents.
Joshua Goldfarb's picture
Playing whack-a-mole with malicious code infections, phishing sites, and compromised credentials won’t help an enterprise reduce losses due to fraud.
Idan Aharoni's picture
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.