Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The Indiana National Guard says a state, non-military computer server containing personal information on civilian and military Guard personnel was the target of a recent ransomware attack. [Read More]
EU leaders on Thursday condemned the attempted hack on the global chemical weapons watchdog and vowed to step up the bloc's efforts to tackle cyber attacks [Read More]
In Facebook's "War Room," a nondescript space adorned with American and Brazilian flags, a team of 20 people monitors computer screens for signs of suspicious activity [Read More]
A former high school teacher was charged in an investigation into the 2014 "celebgate" scandal in which hackers obtained nude photographs and other private information from more than 200 people, including celebrities. [Read More]
A former Equifax manager who was put in charge of creating the equifaxsecurity2017.com website following the massive breach at the credit reporting agency has been sentenced to 8 months of home confinement for insider trading [Read More]
British Prime Minister May will call on fellow EU leaders to take united action to punish cyber attackers, warning hackers cause economic harm and undermine democracies. [Read More]
The maker of the LuminosityLink RAT was sentenced to 30 months in federal prison [Read More]
A cyber espionage group named GreyEnergy, linked by researchers to Russia's BlackEnergy, has been targeting energy and transportation companies in Ukraine and other countries [Read More]
The Illinois Board of Elections hired three cybersecurity experts to watch elections and voter-data systems for irregularities. [Read More]
A newly discovered infection campaign is leveraging malicious RTF files to deliver information-stealing Trojans without being detected [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Lance Cottrell's picture
Studying the DNC Hacker case shows just how difficult it is to maintain a false identity in the face of a highly resourced and motivated opponent.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Lance Cottrell's picture
Actively investigating and infiltrating criminal groups online is not “hacking back,” but it may provoke that as a response.
Alastair Paterson's picture
Malicious actors have been experimenting with a blockchain domain name system (DNS) as a way of hiding their malicious activity and bullet-proofing their offerings.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Laurence Pitt's picture
While awareness is key and technology is a great assistant, there is one simple practice we can all adopt: think before you click or share.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”