Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Latvian resident Ruslans Bondars, 37, was convicted by a U.S. jury on Wednesday for his role in the operation of the counter antivirus service Scan4You [Read More]
Serbian police said Wednesday they had arrested a man sought by the FBI under suspicion of being part of a group of cybercriminals who called themselves "The Dark Overlord". [Read More]
Ecuador spied on WikiLeaks founder Julian Assange at its London embassy where he has been living since 2012, according to a media report. [Read More]
A former CIA employee is believed to have provided WikiLeaks the Vault 7 files, which describe many of the hacking tools used by the intelligence agency [Read More]
White House eliminates cybersecurity coordinator role following the departure of Rob Joyce. Lawmakers and cybersecurity experts are not happy with the decision [Read More]
Cybercriminals have been scaling up people-centered threats, increasingly using social engineering rather than automated exploits even in web attacks, a recent report from Proofpoint report reveals. [Read More]
As part of its Global Transparency Initiative, Russia-based Kaspersky Lab announced that it will adjust its infrastructure to move a number of "core processes" from Russia to Switzerland. [Read More]
Hackers have stolen an unknown amount of money from banks in Mexico in a series of cyber attacks on the country's interbank payments system, an official said. [Read More]
In recent years there has been an increasing effort to cleanse the ecosphere of deceptive apps, sometimes described potentially unwanted programs or "PUPs". [Read More]
A recently detected PowerShell backdoor can steal information and execute various commands on the infected machines. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Markus Jakobsson's picture
Men and women may jokingly refer to their significant other as their “partner in crime,” but when it comes to romance scams, this joke may become a sad reality.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
Oliver Rochford's picture
Cryptocurrencies have revolutionized the economics of cybercrime, with a noticeable impact on threat actors’ Tactics, Techniques and Procedures (TTP’s).
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.