Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Few data breach victims can ever pin the blame on any specific breach, whether that’s Equifax from 2017 or the recently disclosed breach at Capital One. [Read More]
The threat actor behind the cyberespionage campaign dubbed Machete continues to be active and some of its most recent attacks targeted the military in Venezuela and Ecuador. [Read More]
A variant of the Mirai Internet of Things (IoT) malware is using a command and control (C&C) server on the Tor network, Trend Micro’s security researchers have discovered. [Read More]
Facebook said it derailed a pair of shady online influence campaigns in the Arabic-speaking world including one linked to the Saudi Arabian government. [Read More]
Cybercriminals managed to divert $2.5 million in a business email compromise (BEC) scam targeting Cabarrus County, North Carolina. $1.7 million remains missing. [Read More]
Edward Snowden, the disgraced former National Security Agency contractor who fled to Russia after leaking information about the US government's mass surveillance program, is publishing a memoir. [Read More]
Transgender Paige Thompson was taken into custody at her home and has been charged with computer fraud and abuse in connection with hacking data from more than 100 million Capital One credit holders or applicants. [Read More]
A series of targeted attacks is attempting to exploit Remote File Inclusion (RFI) vulnerabilities to deploy phishing kits, Akamai warns. [Read More]
Capital One says a hacker got access to the personal information of over 100 million individuals applying for credit. [Read More]
The first half of 2019 was dominated by an increase in malware using encryption, and in malware targeting Internet of Things (IoT) devices, a recent threat report reveals. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Alastair Paterson's picture
As we continue to gear up for an increase in shopping this holiday season, remember that attackers continue to innovate and update their training and skills regularly.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.