Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

An anti-terrorism agent in France's domestic intelligence service could soon face trial on charges of selling confidential data and fake IDs in the hidden corners of the internet, prosecutors say. [Read More]
The Saudi embassy in Washington dismissed suggestions the kingdom hacked the phone of Washington Post owner Jeff Bezos, as media reports linked the security breach to a WhatsApp message from an account of Crown Prince Mohammed bin Salman. [Read More]
Brazilian prosecutors accused U.S. journalist Glenn Greenwald of involvement in hacking the phones of officials involved in a corruption investigation. [Read More]
16Shop offers its phishing kit as a malware-as-a-service (MaaS) and includes several features designed to make it more resilient against defenders, and easier to use by wannabe hackers. [Read More]
The US military claims to have "successfully" disrupted the online propaganda efforts of the Islamic State in a hacking operation dating back at least to 2016. [Read More]
Personal and corporate information was stolen from Mitsubishi Electric during a data breach that occurred last year. [Read More]
A new methodology for instigating ransomware makes use of Windows' own Encrypting File System (EFS). [Read More]
A Georgia man has admitted in court to employing a third-party to launch a distributed denial of service (DDoS) attack. [Read More]
Hanna Andersson has quietly disclosed a data breach to affected customers, with very few details of the breach available to the public. [Read More]
Apple has published its latest transparency report, which provides details on the number of government requests the tech company received during the first half of 2019. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
The holidays are also a bonanza for cybercriminals whose own sales and purchases of contraband on the dark web mirror the one-day-only specials of their consumer-facing counterparts.
Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.