Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The Vatican and the Catholic Diocese of Hong Kong have been the targets of alleged Chinese state-backed hackers ahead of talks on renewal of a landmark 2018 deal that helped thaw diplomatic relations between the Vatican and China. [Read More]
Video creation service Promo.com this week confirmed that user data was exposed as a result of a data breach identified last week. [Read More]
Russian intelligence services are using a trio of English-language websites to spread disinformation about the coronavirus pandemic, seeking to exploit a crisis that America is struggling to contain ahead of the presidential election in November. [Read More]
The VHD ransomware family that emerged earlier this year is the work of North Korea-linked threat actor Lazarus. [Read More]
A majority of election administrators in the United States have yet to implement cybersecurity controls designed to provide protection against phishing attacks. [Read More]
North Korean-linked threat actor Lazarus has been employing at least four new Mac-targeting malware families in recent attacks. [Read More]
The United States and the United Kingdom warned in a joint alert issued this week that a piece of malware has infected over 62,000 QNAP NAS devices. [Read More]
In the past several days, a hacker managed to replace the payloads typically delivered by the Emotet Trojan with GIF images. [Read More]
Computer networks of Garmin were coming back online Monday after an outage widely believed to have been due to a ransomware attack. [Read More]
Digital banking service Dave announced over the weekend that user data was compromised in a third-party security incident. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Alastair Paterson's picture
As we continue to gear up for an increase in shopping this holiday season, remember that attackers continue to innovate and update their training and skills regularly.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.