Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A Russian man promising stolen hacking tools and compromising information on President Donald Trump fleeced American spies for $100,000 last year, The New York Times reported. [Read More]
South Korea on Saturday investigated a mysterious internet shutdown during the Winter Olympics opening ceremony, which follows warnings of possible cyberattacks during the Pyeongchang Games. [Read More]
The Philippine bank used by hackers to transfer money in the world's biggest cyber heist warned of tit-for-tat legal action Thursday, after Bangladeshi officials said they would sue the lender. [Read More]
An actor making extensive use of scripting languages in attacks on targets in the Middle East demonstrates excellent operational security (OPSEC), Talos reports. [Read More]
Researchers have discovered a new Point of Sale (POS) malware, but have not been able to determine whether it is new code still being developed, or already used in attacks. [Read More]
The personal details of 800,000 customers of Swiss telecoms giant Swisscom were compromised in a data breach [Read More]
Bangladesh's central bank will file a lawsuit in New York against a Philippine bank over the world's largest cyber heist, the finance minister said Wednesday. [Read More]
The US Justice Department indicted 36 people accused of running a transnational ring stealing and selling credit card and personal identity data, causing $530 million in losses. [Read More]
The 'responsible encryption' demanded by law enforcement and some politicians will not prevent criminals 'going dark'; will weaken cyber security for innocent Americans; and will have a hit on the U.S. economy. [Read More]
The prevalence of the Luminosity remote access Trojan (RAT) is fading away after the malware was supposedly killed half a year ago, Palo Alto Networks says. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Josh Lefkowitz's picture
Most threat intel teams haven’t been conditioned to maintain a comprehensive understanding of how geopolitical factors can influence, emergent strains of malware, insider threats, or supply chain security vulnerabilities.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.
Josh Lefkowitz's picture
Organizations seeking to obtain actionable intelligence from the Deep & Dark Web (DDW) should recognize that doing so creates risk and requires substantial expertise, resources, and time.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Alastair Paterson's picture
With elections coming up in the UK in June and Germany in September what type of cyber interference might we expect? And, more importantly, what steps can we take to mitigate risk?
Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.