Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Trump's apparent concessions to Putin over the election controversy drew stinging condemnation from across the political divide. [Read More]
A new series of reconnaissance attacks targeting ActiveX objects has been associated with the North Korean-linked Andariel group, a known branch of the notorious Lazarus Group. [Read More]
The compromise of an ESLint maintainer’s account resulted in malicious packages designed to steal login tokens from the npm software registry. [Read More]
Russia was the target of almost 25 million cyber-attacks during the World Cup, President Vladimir Putin said, though he did not indicate who may have been behind the attacks [Read More]
The losses and potential losses reported as a result of business email compromise (BEC) and email account compromise (EAC) scams exceed over $12 billion globally, says the FBI [Read More]
US formally lifts a crippling ban on exports to China's ZTE, rescuing the smartphone maker from the brink of collapse after it was denied key components [Read More]
Donald Trump said he may ask Vladimir Putin to extradite to the US 12 Russian intelligence officers accused of attempting to interfere with the 2016 presidential election. [Read More]
Twelve Russian intelligence officers have been indicted by a grand jury for hacking Democratic Party emails ahead of the 2016 US presidential election, Deputy Attorney General Rod Rosenstein announced Friday. [Read More]
Recently discovered cyber attacks targeting iPhone users have been using an open-source mobile device management (MDM) system to control enrolled devices, Talos reports. [Read More]
Ukraine’s security service says it has blocked a VPNFilter attack on a critical infrastructure organization (a chlorine station) and accused Russian intelligence of being behind the operation [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Markus Jakobsson's picture
Men and women may jokingly refer to their significant other as their “partner in crime,” but when it comes to romance scams, this joke may become a sad reality.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
Oliver Rochford's picture
Cryptocurrencies have revolutionized the economics of cybercrime, with a noticeable impact on threat actors’ Tactics, Techniques and Procedures (TTP’s).
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Alastair Paterson's picture
With better security practices both on an individual and organizational level, you can mitigate the risk of cryptocurrency fraud while remaining an active user.
Alastair Paterson's picture
The most technically sophisticated use detailed social engineering techniques, zero-day exploits and weaknesses in the supply chain.