Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Denmark’s biggest news agency has been hit by a ransomware attack that forced editorial systems to be shut down as about a quarter of its 100 servers have been damaged. [Read More]
Specialty networking solutions provider Belden has disclosed a data breach resulting in the theft of employee and business information. [Read More]
A threat group tracked as Stantinko was observed using a new version of a Linux proxy Trojan that poses as Apache servers to remain undetected. [Read More]
Apple Chief Security Officer Thomas Moyer promised to give the Santa Clara County sheriff's office 200 iPads, worth about $70,000, in exchange for concealed weapons permits (CCW), the county's district attorney alleged in a statement Monday. [Read More]
Cybercriminals were able to change the DNS settings of some cryptocurrency websites after tricking GoDaddy employees into providing them with access to customer accounts. [Read More]
A Chinese threat actor tracked as Mustang Panda was observed using an updated arsenal of tools in recent attacks. [Read More]
The FBI this week issued an alert to warn the public of spoofed FBI-related Internet domains. [Read More]
Following a takedown attempt in October, the TrickBot malware has received various improvements that are designed to make it more resilient. [Read More]
Google faces fresh regulatory scrutiny in Britain over plans to revamp its ad data system, after an industry lobbying group complained to the competition watchdog that the changes would cement the U.S. tech giant’s online dominance. [Read More]
Two Romanians suspected of running services for encrypting malware and testing it against antivirus engines were arrested last week. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Idan Aharoni's picture
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Justin Fier's picture
CISA has recently designated many cyber security positions ‘essential roles', and our understanding of essential businesses and essential employees will continue to change as the pandemic evolves.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.