Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

QNAP informs users how to identify and mitigate dovecat malware infections. [Read More]
Unprotected Windows RDP servers have been abused to amplify DDoS attacks, with observed attacks ranging between 20 and 750 Gbps. [Read More]
A misconfiguration resulted in more than 1,000 stolen corporate credentials exposed in plain sight. [Read More]
Microsoft has released another report detailing the tactics, techniques and procedures of the SolarWinds hackers. [Read More]
The multi-stage, tag-based malicious ad campaign is heavily obfuscated and employs clever tricks to avoid detection. [Read More]
Ransomware attacks took a heavy toll on the United States last year with more than 2,000 victims in government, education and health care, security researchers say in a new report. [Read More]
New Linux malware creates a botnet of infected devices to launch distributed denial of service or crypto-mining attacks. [Read More]
Malwarebytes said it was targeted by the state-sponsored threat actor that breached SolarWinds. [Read More]
Security researchers see 5,447 devices still connecting to a sinkholed VPNFilter C&C domain on a single day. [Read More]
Symantec researchers have uncovered another piece of malware used in the SolarWinds attack, namely Raindrop, which has been used for lateral movement and payload deployment. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Joshua Goldfarb's picture
For any fraud detection solution to be practical, it must be easily integrated into security and fraud operations.
Derek Manky's picture
2020 has taught us to revisit the practice of inspecting encrypted traffic. These are all standard security protocols to step up in light of what cybercriminals are doing now.
Idan Aharoni's picture
With law enforcement’s ability to adapt, showing consistent results despite cybercriminals’ adoption of new technologies, as well as the increase in awareness of cyber attacks, there’s still a room for optimism – not only for the next year, but also for the next decade.
Joshua Goldfarb's picture
Facts, data, and evidence are extremely important to properly detecting, preventing, and investigating both security incidents and fraud incidents.
Joshua Goldfarb's picture
Playing whack-a-mole with malicious code infections, phishing sites, and compromised credentials won’t help an enterprise reduce losses due to fraud.
Idan Aharoni's picture
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.