Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The Linux.org community website was defaced after someone hacked its registrar account and hijacked DNS settings. [Read More]
Europol this week announced that 168 people were arrested in a massive operation that resulted in the identification of 1504 money mules. [Read More]
A 44-year-old man from California has been sentenced to 26 months in prison for launching DDoS attacks against two astronomy websites. [Read More]
The European Union and its citizens should be "worried" about telecoms giant Huawei and other Chinese firms that cooperate with Beijing's intelligence services, official warns. [Read More]
A security research project called DeepPhish examined the extent to which ML technologies can genuinely aid in the detection of phishing, and the extent to which those same technologies could be used by cybercriminals to by-pass anti-phishing defenses. [Read More]
A threat group possibly originating from North Korea has been targeting academic institutions since at least May this year, NetScout’s security researchers reveal. [Read More]
A new class action lawsuit filed against Marriott following the massive data breach alleges that the hotel giant still exposes customer information. [Read More]
The arrest of Huawei's chief financial officer at the request of US authorities signals a toughening stand in Washington on dealing with Chinese tech firms amid longstanding concerns over cyberespionage. [Read More]
Some clues left behind by the hackers that breached Marriott suggest that they were conducting cyber espionage on behalf of the Chinese government, Reuters reports. [Read More]
Australia passed controversial laws allowing spies and police to snoop on the encrypted communications of suspected terrorists and criminals. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Laurence Pitt's picture
While awareness is key and technology is a great assistant, there is one simple practice we can all adopt: think before you click or share.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Alastair Paterson's picture
By closely following trends watching for new activities and actors across a variety of data sources, security professionals can continue to take steps to mitigate the digital risk to their enterprises, partners and customers.
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.