Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A technical alert issued by the US and UK details how Russian state-sponsored hackers target government and private-sector organizations by abusing various networking protocols [Read More]
Russian government-sponsored hackers are compromising the key hardware of government and business computer networks like routers and firewalls, giving them virtual control of data flows, Britain and the United States warned. [Read More]
Proofpoint says it has managed to sinkhole the EITest infection chain, which redirected users to exploit kits (EKs), social engineering schemes, and other malicious or fraudulent operations. [Read More]
Attempts to exploit the recently patched Drupal vulnerability dubbed Drupalgeddon2 spotted shortly after PoC exploit is published [Read More]
Russian intelligence was spying on former double agent Sergei Skripal and his daughter Yulia for at least five years before they were poisoned in a nerve agent attack, Britain's National Security Adviser Mark Sedwill said in a letter to NATO. [Read More]
Head of the GCHQ spy agency reveals that the UK has launched a major cyberattack on the Islamic State [Read More]
A series of geopolitically motivated attacks ongoing since early 2017 and targeting high profile organizations worldwide appear to be a symptom of escalating tensions in the Middle East [Read More]
Some of the most popular music videos on YouTube including mega-hit "Despacito" momentarily disappeared Tuesday in an apparent hacking. [Read More]
Ransomware is the most prevalent type of malware and it increasingly targets business-critical systems, according to Verizon’s 2018 Data Breach Investigations Report (DBIR) [Read More]
Over 95% of the email domains managed by the Executive Office of the President (EOP) haven’t implemented the Domain Message Authentication Reporting & Conformance (DMARC) protocol. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Siggi Stefnisson's picture
I think it’s largely understood that the rise of a virtual, anonymized and easy-to-use payment system was a key factor in making ransomware the phenomenon it is today.
Lance Cottrell's picture
The internet drives much of the world’s intelligence gathering, but its rapid evolution and lack of flexible policy-making is affecting how analysts do their jobs.
Markus Jakobsson's picture
While there are no signs today of criminals consolidating and reselling data from different breaches, it is an obvious concern as the value-add of the packaging would be substantial.
Josh Lefkowitz's picture
Retailers need relevant, actionable intelligence that can help them gain a decision advantage over the threats and adversaries they face year-round -- not just during the holiday shopping season.
Alastair Paterson's picture
The holiday season is in full swing and once again we can expect to see a surge in cyber attacks targeting retailers and consumers.
Siggi Stefnisson's picture
When disaster strikes, cyber criminals are always right behind, ready to apply social engineering techniques to take advantage of both the victims and people wishing to help.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.