Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The Department of Justice this week announced the arrest of two individuals charged for participating in a long-term tech support fraud scheme. [Read More]
Smarter phishing campaigns are popping up as cybercriminals leverage emerging technologies and tools like spoofing, automation, machine learning and social engineering. [Read More]
A recently observed phishing campaign is targeting taxpayers in the United States in an attempt to infect their machines with Amadey malware. [Read More]
A Magecart threat actor has compromised the websites of two hotel chains to inject scripts targeting Android and iOS users. [Read More]
The Smominru botnet continues to spread at a fast pace, infecting around 4,700 new hosts daily during the month of August. [Read More]
Philippines immigration agents, backed by troops, have arrested more than 300 Chinese for alleged cyber crimes, a week after a similar number were detained during a raid linked to investment fraud. [Read More]
Following a 4-month vacation, Emotet’s operators are back at it, borrowing a recently introduced spear-phishing technique to deliver their malware. [Read More]
The U.S. could launch a cyberattack on Iran in response to the recent drone attack on major oil facilities in Saudi Arabia. [Read More]
Facebook has shut down 200 accounts, groups and pages originating in Iraq and Ukraine that engaged in “inauthentic behavior.” [Read More]
A previously undocumented hacking group called Tortoiseshell is using custom and off-the-shelf malware to target technology companies in Saudi Arabia in what appears to be supply chain attacks. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.