Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Threat actors affiliated with the Chinese Ministry of State Security (MSS) continue to target U.S. government agencies, CISA warns. [Read More]
Personal information of roughly 46,000 veterans was affected in a recent security incident, the U.S. Department of Veterans Affairs (VA). [Read More]
Thousands of Magento-powered online stores have been hacked over the past few days as part of a skimming campaign that has been described as the “largest ever.” [Read More]
Virginia’s largest school system has been hacked and the attackers are seeking a ransom payment to keep them from disclosing stolen personal information. [Read More]
The Central Bank of Seychelles announced that the Development Bank of Seychelles (DBS) was targeted in a ransomware attack. [Read More]
Researchers at Temple University have been tracking ransomware attacks on critical infrastructure and they are providing the data for free. [Read More]
Tehran on Friday hit back at allegations by Microsoft that Iran based hackers had targeted the US presidential campaigns, declaring it does not care about the election's outcome. [Read More]
Attacks targeting a recently patched vulnerability in the WordPress plugin File Manager are ramping up. [Read More]
For the past year, Russia-linked threat actor Strontium has targeted hundreds of organizations in the United States and the United Kingdom to harvest account credentials. [Read More]
Data center and colocation services provider Equinix this week revealed that it was the victim of a ransomware attack. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.