Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Balance Theory, a seed-stage startup working on technology to help security teams collaborate and manage data flows securely, has closed a $3 million funding round. [Read More]
Redigo is a new Go-based backdoor targeting Redis servers to take over compromised machines. [Read More]
Rackspace is investigating a security incident that may involve exploitation of a Microsoft Exchange vulnerability named ProxyNotShell. [Read More]
A hospital complex in Versailles, near Paris, had to cancel operations and transfer some patients after being hit by a cyberattack over the weekend. [Read More]
California’s Department of Justice mistakenly posted the names, addresses and birthdays of nearly 200,000 gun owners on the internet because officials didn’t understand how to operate their website. [Read More]
CISA and the FBI warn that Cuba ransomware attacks targeting critical infrastructure continue, with over 100 organizations compromised to date. [Read More]
An Android trojan named Schoolyard Bully, designed to phish Facebook credentials, has infected more than 300,000 devices across 71 countries. [Read More]
Pangea Cyber, an early stage startup working on technology in the API security services space, has banked $26 million in a new funding round led by Google Ventures. [Read More]
Albanian prosecutors have asked for the house arrest of five public employees they blame for not protecting the country from a cyberattack by alleged Iranian hackers. [Read More]
LastPass and its affiliate GoTo have disclosed a new data breach involving a ​​third-party cloud storage service. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Derek Manky's picture
While the number of detections has been lower so far than other types of cyberattacks, the very nature of wipers and how they’re used makes them very dangerous.
Joshua Goldfarb's picture
If security can learn to communicate in a way that executives and boar members can understand, internalize, and act upon, it serves to benefit tremendously.
Derek Manky's picture
Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them.
Landon Winkelvoss's picture
Organizations need to be able to go outside the firewall to gather as much threat actor information as possible to build robust internal defenses against fraud.
Laurence Pitt's picture
Between the excitement and the comfort of working from home, it can be easy to overlook the risks associated with summer travel, but it’s important to remain careful and vigilant.
Derek Manky's picture
We hear a lot about drug mules, but what are cyber mules? It’s similar to how drug dealers rely on unsuspecting or otherwise vulnerable people to help them transport drugs or launder the proceeds of those sales.
Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.