Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

US prosecutors announced they have charged three people, one of them from Britain, for roles in hijacking celebrity Twitter accounts and tricking people out of money. [Read More]
Cybercriminals could be stealing data from EMV payment cards and using it to create magnetic stripe cards which they can use for card-present transactions. [Read More]
Twitter on Thursday revealed that several employees were targeted with phone spear-phishing in a social engineering attack leading to the recent security incident. [Read More]
Roughly one month after senators introduced a “balanced” bill that would require tech companies to provide law enforcement with access to encrypted user data, a companion bill was introduced in the House of Representatives this week. [Read More]
The European Union imposed its first ever sanctions against alleged cyber attackers, targeting Russian and Chinese individuals and a specialist unit of Moscow's GRU military intelligence agency. [Read More]
The US ambassador in Brasilia warned of "consequences" if Brazil chooses Chinese telecoms company Huawei to develop its 5G network. [Read More]
The FBI has released an alert to warn businesses of ongoing cyberattacks involving the NetWalker ransomware. [Read More]
Britain named former ambassador to Turkey Richard Moore as the new director of the MI6 Secret Intelligence Service. [Read More]
FireEye security researchers have linked a series of disinformation operations to Russia, that have been ongoing since at least March 2017. [Read More]
AWS announces the general availability of a fully managed service designed to help customers identify potentially fraudulent online activities. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.