Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Pixalate, a firm that provides fraud protection for mobile app and connected TV advertising, has raised $18.1 million in growth capital, bringing the total amount raised by the company to $22.7 million. [Read More]
The social media advertising giant has shared an updated payout guideline for vulnerability hunters to better understand its bounty decisions. [Read More]
Software vendor SolarWinds failed to enable ASLR, an anti-exploitation feature available since the launch of Windows Vista 15 years ago. The oversight that made it easy for attackers to launch targeted malware attacks in July this year. [Read More]
Network detection and response play Corelight has raised a fresh $75 million funding round to speed up its global expansion ambitions. [Read More]
The application can be used to monitor someone’s phone use, online activity, and even physical movements, but exposes users to stalkers and abuse, the FTC argues. [Read More]
The two agencies warn of a noticeable increase in ransomware attacks on holidays and weekends, when offices are closed. [Read More]
The Singapore government augments its existing bug bounty program and VDP to offer bounty rewards of up to $150,000 for exceptionally impactful vulnerabilities. [Read More]
Israeli software giant Check Point joins the cybersecurity shopping spree with a definitive deal to acquire Avanan [Read More]
Bitdefender discovers the financially motivated threat actor FIN8 using a new potent backdoor in its malware arsenal. [Read More]
The Japan-based cryptocurrency exchange says hackers stole Ethereum, Bitcoin, Stablecoins, Ripple, and other tokens. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.