Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

There are more than 3,000 BIG-IP installations vulnerable to attacks exploiting CVE-2020-5902 and hackers have been using the flaw to deliver DDoS malware. [Read More]
China urged France Monday to guarantee a "fair and just" environment for its companies after Paris decided to restrict licenses for telecom operators using 5G technology from Huawei. [Read More]
Facebook, WhatsApp and Telegram will deny law enforcement requests for user data in Hong Kong as they assess the impact of a new national security law. [Read More]
G Data security researchers have identified a new ransomware family that attempts to spread using infected USB drives. [Read More]
A former Yahoo! employee who admitted to hacking into the accounts of thousands of users was sentenced last week to five years of probation. [Read More]
Hackers linked to the North Korean government are believed to be behind the Magecart attacks on Claire’s and other online stores. [Read More]
A Nigerian national has been accused of orchestrating an international cyber fraud scheme that federal prosecutors say defrauded U.S. businesses in six states out of tens of millions of dollars. [Read More]
USCYBERCOM is advising BIG-IP users to patch CVE-2020-5902, a vulnerability that allows an attacker to take complete control of a system and which has already been exploited in attacks. [Read More]
China's Huawei is not totally banned from France's next-generation 5G wireless market, but French operators using them will only get limited licences. [Read More]
Recent fires and explosions at Iranian facilities, including the Natanz nuclear site targeted by the notorious Stuxnet malware, may have been caused deliberately as part of an operation that involved cyberattacks. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.