Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

16Shop offers its phishing kit as a malware-as-a-service (MaaS) and includes several features designed to make it more resilient against defenders, and easier to use by wannabe hackers. [Read More]
The US military claims to have "successfully" disrupted the online propaganda efforts of the Islamic State in a hacking operation dating back at least to 2016. [Read More]
Personal and corporate information was stolen from Mitsubishi Electric during a data breach that occurred last year. [Read More]
A new methodology for instigating ransomware makes use of Windows' own Encrypting File System (EFS). [Read More]
A Georgia man has admitted in court to employing a third-party to launch a distributed denial of service (DDoS) attack. [Read More]
Hanna Andersson has quietly disclosed a data breach to affected customers, with very few details of the breach available to the public. [Read More]
Apple has published its latest transparency report, which provides details on the number of government requests the tech company received during the first half of 2019. [Read More]
Turkish hackers claimed Friday to have hijacked for more than 90 minutes the official websites of the Greek parliament, the foreign affairs and economy ministries, as well as the country's stock exchange. [Read More]
WeLeakInfo(.)com, a website that sold stolen personal data to subscribers, has been seized by the FBI as part of an international law enforcement operation. [Read More]
A computer security expert says he found that a forensic image of the election server central to a legal battle over the integrity of Georgia elections showed signs that the original server was hacked. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
The holidays are also a bonanza for cybercriminals whose own sales and purchases of contraband on the dark web mirror the one-day-only specials of their consumer-facing counterparts.
Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.