Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google researchers call attention to the ongoing “patch-gap” problem, warning that downstream vendors continue to be tardy at delivering security fixes to Android-powered devices. [Read More]
Interpol has announced the arrest of ten individuals in Africa linked to scam and fraud activities worth roughly $800,000. [Read More]
Security researchers at Proofpoint call attention to the discovery of a commercial red-teaming attack tool called Nighthawk, warning that the command-and-control framework is likely to be abused by threat actors. [Read More]
The cybersecurity powerhouse plans to spend $195 million in cash to acquire Israeli application security startup Cider Security. [Read More]
Investors pour $65 million into an early-stage Israeli startup building technology to help businesses manage secrets like credentials, certificates and keys. [Read More]
Bishop Fox has raised more than $154 million in lifetime funding to build and market technology for continuous attack surface management. [Read More]
China-linked cybercrime group Fangxiao set up over 40,000 malicious websites spoofing more than 400 popular brands. [Read More]
For the second consecutive month, Microsoft rushed out patches to cover vulnerabilities that were already exploited as zero-day in the wild, including a pair of belated fixes for exploited Microsoft Exchange Server flaws. [Read More]
The US government has seized $3.4 billion in bitcoin from a real estate developer who stole the cryptocurrency from the dark web marketplace Silk Road a decade ago. [Read More]
Redmond warns that China-based nation state threat actors are taking advantage of a one-year-old law to “stockpile” zero-days for use in sustained malware attacks. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Joshua Goldfarb's picture
If security can learn to communicate in a way that executives and boar members can understand, internalize, and act upon, it serves to benefit tremendously.
Landon Winkelvoss's picture
Organizations need to be able to go outside the firewall to gather as much threat actor information as possible to build robust internal defenses against fraud.
Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Joshua Goldfarb's picture
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
Landon Winkelvoss's picture
Similar to investigations that disrupt cyberattacks on retailers, the same tactics, techniques, and procedures (TTPs) can be leveraged against those that sell counterfeit or stolen goods.
Joshua Goldfarb's picture
The question of the importance of the state of a client device is a debate that has been around for a few years in the security field.
Idan Aharoni's picture
Fraudsters will determine who to target within the industry based on each service’s fraud prevention policies and maturity, rather than generally targeting the industry.
Joshua Goldfarb's picture
Josh Goldfarb debunks the most common myths surrounding fraud, security and user experience.