Security Experts:

long dotted


Spanish authorities are pledging full transparency as they launch inquiries into allegations that the phones of dozens of supporters of Catalan independence were hacked with powerful and controversial Pegasus spyware. [Read More]
The first ransomware to be coded in RUST, BlackCat has compromised at least 60 entities worldwide. [Read More]
The court is expected to issue an extradition order to send Assange to the United States, which will then be sent to the Home Secretary Priti Patel for approval. [Read More]
Israeli startup SeeMetrics raises early-stage funding to build technology to help cybersecurity teams measure, track and simplify security program operations. [Read More]
Security researchers have found fresh evidence linking a pair of mercenary Israeli hacking companies to mobile malware attacks on members of Catalan civil society. [Read More]
VMWare warns that an authenticated attacker with network access to the VMware Cloud Director tenant or provider can exploit a remote code execution vulnerability to gain access to the server. [Read More]
Microsoft has disrupted the operation of one of the most notorious cybercrime botnets and named a Crimean hacker as an alleged perpetrator. [Read More]
OpenSSH 9.0 has been fitted with new defaults to prevent "capture now, decrypt later" attacks linked to advancements in quantum computing. [Read More]
An international law enforcement operation took down the "RaidForums" marketplace that sold access to database leaks from U.S. companies including credit card details, user names and passwords for online accounts. [Read More]
Spyware maker NSO Group is turning to the U.S. Supreme Court as it seeks to head off a high-profile lawsuit filed by the WhatsApp messaging service. [Read More]

FEATURES, INSIGHTS // Tracking & Law Enforcement

rss icon

Tom Grubb's picture
Fighting web fraud is a game of cat and mouse between fraud analysts and cybercriminals where the odds are stacked against fraud analysts. Transaction data can provide a window into behaviors that can help identify cybercrime hot spots still in formation.
Markus Jakobsson's picture
We designed and performed an experiment that allows us to take the pulse on Nigerian scammers. Are the scammers really from Nigeria? What do they want, and how do they get it?