Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

American business magazine Fast Company confirms Apple News account hijack after its content management system (CMS) was hacked. [Read More]
Recent high-profile cyberattacks have demonstrated the effectiveness of an interesting method for getting past MFA. [Read More]
Hackings, network sabotage and other cyber warfare campaigns are being intensely deployed by both sides as Russia's invasion of Ukraine grinds on, though the covert operations have not proved decisive on the battlefield -- at least so far. [Read More]
Facebook says it has identified and stopped a sprawling network of fake accounts that spread Russian propaganda about the invasion of Ukraine throughout Western Europe. [Read More]
SentinelLabs researchers are kick-starting a crowdsourced effort to understand a new mysterious APT hitting hitting telcos, ISPs and universities in the Middle East and Africa. [Read More]
Cybersecurity firm Human disrupts Scylla ad fraud campaign consisting of 89 mobile applications that gathered over 13 million downloads. [Read More]
Civil rights lawyers and senators are pushing for legislation that would limit U.S. law enforcement agencies’ ability to buy cellphone tracking tools to follow people’s whereabouts. [Read More]
Security researchers are warning of a new information stealer named Erbium being distributed as Malware-as-a-Service (MaaS). [Read More]
Elbit Systems of America has confirmed suffering a breach after the Black Basta ransomware gang claimed to have stolen data from the company’s systems. [Read More]
A class action lawsuit filed against Samsung alleges that the company unnecessarily collected user data, then stored and sold it without proper security protections. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Derek Manky's picture
Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them.
Landon Winkelvoss's picture
Organizations need to be able to go outside the firewall to gather as much threat actor information as possible to build robust internal defenses against fraud.
Laurence Pitt's picture
Between the excitement and the comfort of working from home, it can be easy to overlook the risks associated with summer travel, but it’s important to remain careful and vigilant.
Derek Manky's picture
We hear a lot about drug mules, but what are cyber mules? It’s similar to how drug dealers rely on unsuspecting or otherwise vulnerable people to help them transport drugs or launder the proceeds of those sales.
Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.