Security Experts:

long dotted


Germany is to join the ranks of NATO countries making its cyber warfare skills available to the alliance to help fight hacking and electronic warfare, officials said. [Read More]
Former Air Force intelligence officer, Monica Elfriede Witt, has been charged with providing secret U.S. information to the Iranian government. [Read More]
The ransomware market is still growing, but the number of successful ransomwares is declining, with an increasing involvement of nation-states in ransomware attacks. [Read More]
Malta's largest bank was the target of a cyber attack Wednesday, with hackers attempting to withdraw 13 million euros ($14.7 million). [Read More]
A Windows application that can run on Macs has been caught downloading and installing malware. [Read More]
Beijing calls the latest US warning against using Huawei equipment "groundless", as the Chinese telecom giant faces espionage fears in a growing number of countries. [Read More]
Researchers have detected a new, stealthy Astaroth trojan campaign that uses anti-malware product Avast to inject a malicious module into one of its processes. [Read More]
Apophis Squad hackers, one from the US and one from the UK who is already serving a prison sentence there, have been charged by US authorities. [Read More]
UK-based Identity Data Intelligence specialist GBG has agreed to acquire the Atlanta-based identity verification and fraud prevention services provider IDology for $300 million in cash. [Read More]
One of the many vulnerabilities patched by Microsoft with its February 2019 Patch Tuesday updates is an Internet Explorer zero-day which Google says has been exploited in attacks. [Read More]


rss icon

Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Alastair Paterson's picture
As we continue to gear up for an increase in shopping this holiday season, remember that attackers continue to innovate and update their training and skills regularly.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.