Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The private sector has become much more forthcoming about election interference since 2016, providing frequent briefings to key members of Congress. [Read More]
Mozi, a relatively new botnet, has fueled a significant increase in Internet of Things (IoT) botnet activity, IBM reported this week. [Read More]
An Iran linked group, named Rampant Kitten by researchers, has been discovered targeting anti-regime organizations in a campaign that has likely been running since 2014. [Read More]
The founder and CEO of NS8, a cyber fraud prevention and protection company, has been charged with fraud just months after the firm raised $123 million in funding. [Read More]
Patients and donors to at least four different health care providers in Minnesota are being notified that their personal information may have been compromised. [Read More]
Chinese hackers have reportedly stolen information from Spanish laboratories working on a vaccine for Covid-19. [Read More]
U.S. Department of Treasury announces sanctions against Iran-based threat actor APT39, associated individuals, and a front company named Rana. [Read More]
More details have emerged on the operations of the Chinese state-sponsored threat actor known as APT41 and the links between its members. [Read More]
A sophisticated and shady website called HK Leaks has ramped up its "doxxing" of Hong Kong political activists, targeting those it says have broken a sweeping new national security law. [Read More]
Three Iranian nationals have been accused of launching hacker attacks on behalf of the Iranian government against aerospace and satellite companies in the U.S. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Justin Fier's picture
CISA has recently designated many cyber security positions ‘essential roles', and our understanding of essential businesses and essential employees will continue to change as the pandemic evolves.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
The holidays are also a bonanza for cybercriminals whose own sales and purchases of contraband on the dark web mirror the one-day-only specials of their consumer-facing counterparts.