Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Malware found on PoS systems at over 100 Checkers and Rally's locations, which represents roughly 15% of the company’s restaurants. [Read More]
Privacy-focused ProtonMail has been accused of voluntarily helping law enforcement spy on users, but the company has denied the accusations. [Read More]
The New Zealand government said that a "systematic" and "deliberate" cyberattack was behind an embarrassing leak of secret finance documents ahead of this week's budget. [Read More]
Chinese cyber-espionage group Emissary Panda has been targeting government organizations in two different countries in the Middle East, Palo Alto Networks security researchers say. [Read More]
FireEye security researchers have uncovered a network of fake social media accounts that engage in inauthentic behavior and misrepresentation, likely in support of Iranian political interests. [Read More]
News and social media aggregator Flipboard has reset all user passwords after discovering that hackers had access to some of its databases for nearly 10 months. [Read More]
The US city of Baltimore, a victim this month of a cyberattack that paralyzed part of its computer network, will not pay a ransom to undo the damage, Mayor Bernard Young said Tuesday. [Read More]
HawkEye keylogger campaigns observed in April and May 2019 focused on targeting business users, IBM X-Force security researchers report. [Read More]
Researchers have detected what they believe to be new activity from Chinese cyber espionage group, APT10. [Read More]
Researchers with the Sherpa project analyzed the use of social media as a recommendation system -- specifically Twitter -- ahead of the European elections in May 2019. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Markus Jakobsson's picture
Men and women may jokingly refer to their significant other as their “partner in crime,” but when it comes to romance scams, this joke may become a sad reality.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
Oliver Rochford's picture
Cryptocurrencies have revolutionized the economics of cybercrime, with a noticeable impact on threat actors’ Tactics, Techniques and Procedures (TTP’s).
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Alastair Paterson's picture
With better security practices both on an individual and organizational level, you can mitigate the risk of cryptocurrency fraud while remaining an active user.