Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The head of NATO told Russia and other potential foes that the Western military alliance was ready to use all means at its disposal to respond to cyber attacks. [Read More]
Comodo CA issued the largest number of digital certificates used to sign malware samples found on VirusTotal over the past year, Chronicle’s security researchers say. [Read More]
Authorities in Europe this week said they took down Bestmixer.io, one of the leading cryptocurrency mixing service in the world. [Read More]
Britain has shared with 16 NATO allies details of malicious Russian cyber activity in their countries over the last 18 months, foreign minister Jeremy Hunt was to say on Thursday. [Read More]
Amazon confirmed that shareholders rejected proposals to prohibit sales of facial recognition technology to governments and study how it might threaten privacy or civil rights. [Read More]
The skimmer used in a recently discovered Magecart attack on a Magento-based e-commerce website was posing as a payment service provider via a rogue iframe, Malwarebytes reports. [Read More]
The European Union on Friday adopted powers to punish those outside the bloc who launch cyberattacks that cripple hospitals and banks, sway elections and steal company secrets or funds. [Read More]
Researchers have discovered a malware campaign targeting Japan and combining phishing, steganography, PowerShell, and the URLZone and Ursnif malware. [Read More]
A new variant of the Satan ransomware has added new exploits to its portfolio and is looking to compromise more machines by targeting additional vulnerabilities. [Read More]
Report outlines changes observed within the external security postures of political parties and organizations in the U.S. and Europe. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.