Security Experts:

long dotted


An increasing number of companies believe they are being targeted by state-sponsored hacking groups, a new survey shows. [Read More]
The threat actor or group behind the Satan ransomware -- and probably DBGer and Lucky and possibly Iron -- seems to be engaged in a new version or evolution of Satan: 5ss5c. [Read More]
A phishing campaign apparently aimed at Ukrainian gas company Burisma has been linked by researchers to the Russian hacker group APT28. [Read More]
Russian spies hacked a Ukrainian energy company at the center of the impeachment trial of US President Donald Trump. [Read More]
A newly discovered information stealer named Oski is targeting browsers and cryptocurrency wallets, with most victims observed in the United States. [Read More]
A man accused of hacking UK National Lottery accounts via credential stuffing attacks has been sentenced to nine months in prison. [Read More]
The FBI said it was taking steps to improve the accuracy and completeness of its wiretap applications for national security investigations and to provide better training for agents. [Read More]
CISA has advised organizations using Pulse Secure VPN products to patch their installations as malicious actors continue to exploit a vulnerability fixed in April. [Read More]
Industrial cybersecurity firm Dragos has identified seven threat groups that have targeted electric utilities in North America. [Read More]
Over the past year and a half, the North Korea-linked Lazarus group has continued attacks on cryptocurrency exchanges but modified its malware and some techniques. [Read More]


rss icon

Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.