Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The United States' ambassador to Germany said Sunday that President Donald Trump had threatened to cut off intelligence-sharing with countries that dealt with Chinese tech firm Huawei. [Read More]
Iranian hacking groups APT33 and APT34 have been working together for the past 3 years to target dozens of organizations worldwide, and their attacks involved some of the enterprise VPN vulnerabilities disclosed last year. [Read More]
Rising interest in electronic voting has heightened concerns among security experts who fear these systems are vulnerable to hacking and manipulation that could undermine confidence in election results. [Read More]
The Israeli military said the Hamas militant group made attempts to hack soldiers’ phones by posing as young, attractive women on social media, striking up friendships and persuading them into downloading malware. [Read More]
The U.S. Cyber Command (USCYBERCOM) has uploaded new malware samples to VirusTotal, all of which appear to be used by the North Korean-linked threat group Lazarus. [Read More]
Puerto Rico’s government has suspended three employees as federal agents investigate an online scam that attempted to steal more than $4 million from the U.S. territory. [Read More]
Convenience store and gas station chain Rutter’s has informed customers that malware has been found on payment processing systems, with over 70 stores affected. [Read More]
Puerto Rico’s government has lost more than $2.6 million after falling for an email phishing scam, according to a senior official. [Read More]
Huawei was hit with US criminal charges in a 16-count indictment alleging a "decades-long" effort to steal trade secrets from American companies. [Read More]
Security firm Cybereason has been tracking recent espionage campaigns targeting the Middle East and specifically focused on entities and individuals in the Palestinian territories. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
The holidays are also a bonanza for cybercriminals whose own sales and purchases of contraband on the dark web mirror the one-day-only specials of their consumer-facing counterparts.
Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.