Security Experts:

long dotted


Clinical Pathology Laboratories also impacted by the recent AMCA breach. The company says information on 2.2 million patients may have been compromised. [Read More]
Researchers discover EvilGnome, a new Linux backdoor that helps hackers spy on users. [Read More]
The hackers behind the SLUB backdoor have started abusing a recently patched Internet Explorer vulnerability for distribution purposes. [Read More]
A 20-year-old Bulgarian cybercrime specialist has been arrested over a hack and leak of a trove of taxpayer data, which authorities had initially suspected was a Russia-linked cyberattack. [Read More]
A Nigeria-linked threat actor active since at least 2017 has been targeting manufacturing and logistics organizations around the world with information stealers and RATs. [Read More]
Hackers accessed the accounts of Sprint customers via a Samsung website, but it does not appear that they actually breached Sprint or Samsung systems. [Read More]
US schools increasingly targeted with cyberattacks. The widespread adoption of education technology also worsens an attack’s effects when instructional tools are rendered useless by internet outages. [Read More]
A new DNS-changer Trojan is being used in an adware campaign to prevent users from accessing security-related sites. [Read More]
Bulgaria ordered Tuesday a probe into the leak of a trove of taxpayer data in a Russia-linked cyberattack that was disclosed on the same day the former Soviet satellite nation moved to buy US-made F-16 jet fighters. [Read More]
Russia-linked threat group Turla has released new variants of the KopiLuwak Trojan in attacks detected since the beginning of this year, Kaspersky’s security researchers reveal. [Read More]


rss icon

Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.