Security Experts:

long dotted


Rackspace confirms being hit by ransomware as it tries to determine if the cybercriminals managed to steal any sensitive information. [Read More]
A threat actor tracked as ‘Scattered Spider’ is targeting telecom and BPO companies to gain access to mobile carrier networks and perform SIM swapping. [Read More]
The Canadian branch of Amnesty International said Monday it was the target of a cyberattack sponsored by China. [Read More]
Nicholas Truglia, of Florida, was sentenced to 18 months in prison for stealing more than $20 million in a SIM swapping scheme. [Read More]
Balance Theory, a seed-stage startup working on technology to help security teams collaborate and manage data flows securely, has closed a $3 million funding round. [Read More]
Redigo is a new Go-based backdoor targeting Redis servers to take over compromised machines. [Read More]
Rackspace is investigating a security incident that may involve exploitation of a Microsoft Exchange vulnerability named ProxyNotShell. [Read More]
A hospital complex in Versailles, near Paris, had to cancel operations and transfer some patients after being hit by a cyberattack over the weekend. [Read More]
California’s Department of Justice mistakenly posted the names, addresses and birthdays of nearly 200,000 gun owners on the internet because officials didn’t understand how to operate their website. [Read More]
CISA and the FBI warn that Cuba ransomware attacks targeting critical infrastructure continue, with over 100 organizations compromised to date. [Read More]


rss icon

Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Landon Winkelvoss's picture
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Joshua Goldfarb's picture
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
Derek Manky's picture
Botnets have become a fixture in the threat landscape, and are in a state of evolution as they learn and use newer, more evolved cybercriminal attack techniques.
Derek Manky's picture
Organization must remain hyper-vigilant and upgrade their defenses as thoroughly and quickly as possible.
Joshua Goldfarb's picture
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
Landon Winkelvoss's picture
Similar to investigations that disrupt cyberattacks on retailers, the same tactics, techniques, and procedures (TTPs) can be leveraged against those that sell counterfeit or stolen goods.
Derek Manky's picture
While the sky just may be the limit (or actually, it may not be), when it comes to cybercriminals, three key areas where we expect to see more activity in the coming year are space, digital wallets and esports.
Derek Manky's picture
Public and private entities need to collaborate by sharing threat information and attack data to make attacks more difficult and resource-intensive for cybercriminals.