Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Federal authorities say one of the gravest threats to the November election is a well-timed ransomware attack that could paralyze voting operations. [Read More]
As the Nov. 3 presidential vote nears, there are fresh signs that the nation’s electoral system is again under attack from foreign adversaries. [Read More]
Court documents show how two of the alleged Twitter hackers were identified by investigators based on Bitcoin transactions and other evidence. [Read More]
US prosecutors announced they have charged three people, one of them from Britain, for roles in hijacking celebrity Twitter accounts and tricking people out of money. [Read More]
Cybercriminals could be stealing data from EMV payment cards and using it to create magnetic stripe cards which they can use for card-present transactions. [Read More]
Twitter on Thursday revealed that several employees were targeted with phone spear-phishing in a social engineering attack leading to the recent security incident. [Read More]
Roughly one month after senators introduced a “balanced” bill that would require tech companies to provide law enforcement with access to encrypted user data, a companion bill was introduced in the House of Representatives this week. [Read More]
The European Union imposed its first ever sanctions against alleged cyber attackers, targeting Russian and Chinese individuals and a specialist unit of Moscow's GRU military intelligence agency. [Read More]
The US ambassador in Brasilia warned of "consequences" if Brazil chooses Chinese telecoms company Huawei to develop its 5G network. [Read More]
The FBI has released an alert to warn businesses of ongoing cyberattacks involving the NetWalker ransomware. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Alastair Paterson's picture
As we continue to gear up for an increase in shopping this holiday season, remember that attackers continue to innovate and update their training and skills regularly.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.