Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A new threat actor operating under the “Magecart” umbrella landed a malicious skimmer on hundreds of websites through a supply chain attack, security firms reveal. [Read More]
US authorities are in the "advanced" stages of a criminal probe that could result in an indictment of Chinese technology giant Huawei, a report said. [Read More]
Singapore's privacy watchdog imposed fines of Sg$1 million on Integrated Health Information Systems and SingHealth over a cyber-attack that saw health records of about 1.5 million people. [Read More]
A new from Recorded Future looks at the rise and fall of Ashiyane -- Iran's first and foremost security forum -- and its figurehead, Behrooz Kamalian. [Read More]
A recently disclosed attack on Chilean interbank network Redbanc appears linked to notorious North Korean hacking group Lazarus, Flashpoint reports. [Read More]
In a new form of Business Email Compromise (BEC), an attacker assumes the identity of an employee, and asks for his or her paycheck to be sent to a new account. [Read More]
US authorities on charged eight people in a scheme to trade on and profit from stolen corporate information hacked from a government database, court papers showed. [Read More]
United States Senator Ron Wyden (D-OR) on Friday expressed concerns that the federal government shutdown could expose taxpayers to various risks. [Read More]
Mondelez International filed suit against Zurich American Insurance Company over a $100 million insurance claim for damage caused by NotPetya, citing the fairly standard 'act of war' exclusion in many insurance policies. [Read More]
The threat actor responsible for large Dridex and Locky distribution campaigns in the past has been using a brand new backdoor in attacks over the past couple of months, Proofpoint reports. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Alastair Paterson's picture
As we continue to gear up for an increase in shopping this holiday season, remember that attackers continue to innovate and update their training and skills regularly.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Lance Cottrell's picture
Studying the DNC Hacker case shows just how difficult it is to maintain a false identity in the face of a highly resourced and motivated opponent.