Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The Ducktail information stealer has been updated with new capabilities and has adopted new spear-phishing avenues for distribution, such as WhatsApp. [Read More]
The County of Tehama, California, informs employees, recipients of services, and affiliates of data breach. [Read More]
Attorneys general in more than 30 US states have urged the FTC to take into consideration the consumer harms associated with online surveillance and data security practices. [Read More]
Microsoft has observed a threat actor tracked as DEV-0569 updating its delivery methods and distributing the Royal ransomware. [Read More]
A Ukrainian hacker sought by US authorities for a decade was arrested last month in Switzerland, according to reports. [Read More]
A critical vulnerability affecting Omron products has been exploited by a sophisticated piece of malware designed to target industrial control systems (ICS). [Read More]
The Hive ransomware gang has victimized more than 1,300 businesses, receiving over $100 million in ransom payments. [Read More]
The cybersecurity powerhouse plans to spend $195 million in cash to acquire Israeli application security startup Cider Security. [Read More]
Google has won its lawsuit against operators of the Glupteba botnet, which the internet giant disrupted last year. [Read More]
A threat actor has infected hundreds of victims in an ongoing supply chain attack relying on malicious Python packages. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Joshua Goldfarb's picture
If security can learn to communicate in a way that executives and boar members can understand, internalize, and act upon, it serves to benefit tremendously.
Derek Manky's picture
Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them.
Landon Winkelvoss's picture
Organizations need to be able to go outside the firewall to gather as much threat actor information as possible to build robust internal defenses against fraud.
Laurence Pitt's picture
Between the excitement and the comfort of working from home, it can be easy to overlook the risks associated with summer travel, but it’s important to remain careful and vigilant.
Derek Manky's picture
We hear a lot about drug mules, but what are cyber mules? It’s similar to how drug dealers rely on unsuspecting or otherwise vulnerable people to help them transport drugs or launder the proceeds of those sales.
Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.