Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Popular flight tracker Flightradar24 resets passwords of some users after one of the company’s servers got hacked [Read More]
Hackers stole more than $30 million worth of cryptocurrencies from South Korea's Bithumb bitcoin exchange, sending the unit's price falling around the world on Wednesday. [Read More]
China-linked cyber espionage group tracked by Symantec since 2013 as Thrip has targeted satellite operators, telecommunications companies and defense contractors [Read More]
Cybercriminals use a technique dubbed by researchers ZeroFont to bypass Office 365 phishing protections [Read More]
Olympic Destroyer, the malware used in a campaign targeting the recent Olympic Winter Games, has now been used in attacks aimed at bio-chemical threat research organizations in Germany, France, the Netherlands, Switzerland and Ukraine [Read More]
Two individuals pleaded guilty over their role in a loan fraud scheme that involved data stolen in the 2014-2015 data breach at the U.S. Office of Personnel Management (OPM) [Read More]
There is concern that GDPR and other cybersecurity laws have a common unintended consequence: in protecting people from cybercriminals, the laws also protect cybercriminals from security researchers. [Read More]
Former CIA employee, aged 29, charged for providing classified information to WikiLeaks, hacking, and possession of child pornography [Read More]
The Betabot Trojan is being spread in a multi-stage attack that starts with malicious Office documents attempting to exploit a 17-year old vulnerability. [Read More]
The US Senate defied President Donald Trump by voting Monday to overrule his administration's deal with Chinese telecom firm ZTE and reimpose a ban on high-tech chip sales to the company. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Alastair Paterson's picture
By closely following trends watching for new activities and actors across a variety of data sources, security professionals can continue to take steps to mitigate the digital risk to their enterprises, partners and customers.
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Markus Jakobsson's picture
Men and women may jokingly refer to their significant other as their “partner in crime,” but when it comes to romance scams, this joke may become a sad reality.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.