Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A parliamentary committee in the Czech Republic says a national security agency told its members that a foreign country state is believed to be behind a cyberattack on the Czech Foreign Ministry. [Read More]
U.N. experts say they are investigating at least 35 instances in 17 countries of North Koreans using cyberattacks to illegally raise money for weapons of mass destruction programs. [Read More]
Cloud Atlas/Inception cyberspies continue targeting government organizations in Russia and other countries, and they are now using polymorphic malware. [Read More]
The FBI is looking for outside contractors to monitor social media for potential threats, setting up a possible conflict with Facebook and other companies over privacy. [Read More]
Security researchers from Zscaler have found a new remote access Trojan (RAT) for sale on the Dark Web that includes multiple functions and is able to spread via removable USB drives. [Read More]
Ransomware attackers are not looking to simply encrypt local files, but to find and encrypt network shares in order to inflict the greatest harm in the shortest time. [Read More]
A distributor of the Baldr malware declared that further development and support had ceased, contrary to what other cybercriminals were expecting. [Read More]
The newly identified "Lord" exploit kit is targeting vulnerable versions of Adobe's Flash Player, Malwarebytes security researchers say. [Read More]
Pakistani national Muhammad Fahd has been charged in the US for bribing AT&T employees to help him unlock phones and plant malware on the telecoms giant’s network. [Read More]
A panel monitoring U.N. sanctions says North Korean cyber experts have illegally raised money for the country’s weapons of mass destruction programs “with total proceeds to date estimated at up to $2 billion.” [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.