Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The GAO Makes Recommendations to IRS Improve Security of Taxpayer Information [Read More]
Documents associated with the activity of Iranian APT group “Rana” have leaked online. [Read More]
A North Korea-linked hacker group tracked as ScarCruft, APT37 and Group123 continues to evolve and it recently added a Bluetooth harvester to its toolkit. [Read More]
Microsoft SharePoint vulnerability patched earlier this year (CVE-2019-0604) has been exploited in the wild to deliver the China Chopper web shell. [Read More]
A Nigerian cybercrime group dubbed "SilverTerrier" by Palo Alto Networks has grown to over 400 individual actors engaged in cybercriminal activity such as advance fee and 419 scams to BEC and malware distribution. [Read More]
The U.S. Justice Department announced charges against members of a hacking group operating in China allegedly responsible for the massive data breach at health insurer Anthem disclosed in 2015. [Read More]
DHS announces a new report detailing a piece of malware named ELECTRICFISH that North Korea’s Hidden Cobra (Lazarus) hackers use to tunnel traffic. [Read More]
Facebook is unwittingly auto-generating content for terror-linked groups that its artificial intelligence systems do not recognize as extremist, according to a complaint made public on Thursday. [Read More]
A former government intelligence analyst has been charged with leaking classified documents about military campaigns against terrorist group al-Qaeda to a reporter. [Read More]
Two Israeli citizens are accused of being administrators of a website that linked to numerous illegal dark web marketplaces. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Laurence Pitt's picture
While awareness is key and technology is a great assistant, there is one simple practice we can all adopt: think before you click or share.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Alastair Paterson's picture
By closely following trends watching for new activities and actors across a variety of data sources, security professionals can continue to take steps to mitigate the digital risk to their enterprises, partners and customers.
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.