Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Cybercriminals have been scaling up people-centered threats, increasingly using social engineering rather than automated exploits even in web attacks, a recent report from Proofpoint report reveals. [Read More]
As part of its Global Transparency Initiative, Russia-based Kaspersky Lab announced that it will adjust its infrastructure to move a number of "core processes" from Russia to Switzerland. [Read More]
Hackers have stolen an unknown amount of money from banks in Mexico in a series of cyber attacks on the country's interbank payments system, an official said. [Read More]
In recent years there has been an increasing effort to cleanse the ecosphere of deceptive apps, sometimes described potentially unwanted programs or "PUPs". [Read More]
A recently detected PowerShell backdoor can steal information and execute various commands on the infected machines. [Read More]
Undisclosed number of Chili’s restaurants had their payment systems infected with data-stealing malware [Read More]
Chinese telecom giant ZTE said its major operations had "ceased" following last month's US ban on American sales of critical technology to the company, raising the possibility of its collapse. [Read More]
A newly discovered malware family capable of credential theft, cryptomining, click fraud, and other nefarious actions has already infected over 100,000 computers. [Read More]
Recently detected campaigns using the Panda Banker malware are targeting financial institutions worldwide, with those in the United States taking the largest hit, F5 reports. [Read More]
Industry professionals comment on the possibility that Iran will launch cyberattacks in response to the US’s withdrawal from the nuclear deal [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
With better security practices both on an individual and organizational level, you can mitigate the risk of cryptocurrency fraud while remaining an active user.
Alastair Paterson's picture
The most technically sophisticated use detailed social engineering techniques, zero-day exploits and weaknesses in the supply chain.
Siggi Stefnisson's picture
I think it’s largely understood that the rise of a virtual, anonymized and easy-to-use payment system was a key factor in making ransomware the phenomenon it is today.
Lance Cottrell's picture
The internet drives much of the world’s intelligence gathering, but its rapid evolution and lack of flexible policy-making is affecting how analysts do their jobs.
Markus Jakobsson's picture
While there are no signs today of criminals consolidating and reselling data from different breaches, it is an obvious concern as the value-add of the packaging would be substantial.
Josh Lefkowitz's picture
Retailers need relevant, actionable intelligence that can help them gain a decision advantage over the threats and adversaries they face year-round -- not just during the holiday shopping season.
Alastair Paterson's picture
The holiday season is in full swing and once again we can expect to see a surge in cyber attacks targeting retailers and consumers.
Siggi Stefnisson's picture
When disaster strikes, cyber criminals are always right behind, ready to apply social engineering techniques to take advantage of both the victims and people wishing to help.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.