Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The United States, Canada, Australia and New Zealand have joined the U.K. in blaming Russia for the destructive NotPetya attack launched last summer [Read More]
A United States Judge sent two Russian nationals to prison for their involvement in a hacking scheme that compromised roughly160 million credit card numbers and incurred losses of hundreds of millions. [Read More]
Dispel launches platform designed to help secure elections, including voter, ballot and campaign information [Read More]
Malware researchers tend to stop short of saying, 'this country or that actor is behind this attack'. Nevertheless, they are not shy in dropping hints, leaving the reader to make subjective conclusions. [Read More]
UK officially accuses the Russian government of being behind the NotPetya attack, which cost major organizations millions [Read More]
A shooting erupted Wednesday outside the suburban Washington headquarters of the National Security Agency. [Read More]
Bitmessage developers rush to patch remote code execution vulnerability in PyBitmessage in response to a zero-day attack [Read More]
A newly discovered variant of the AndroRAT mobile malware can inject root exploits to perform malicious tasks [Read More]
Litecoin and Dash are expected to replace Bitcoin as the most used payment method on underground portals and marketplaces, Recorded Future suggests in a new report. [Read More]
Cryptocurrency mining malware is not uncommon on industrial systems, according to several cybersecurity firms [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
The most technically sophisticated use detailed social engineering techniques, zero-day exploits and weaknesses in the supply chain.
Siggi Stefnisson's picture
I think it’s largely understood that the rise of a virtual, anonymized and easy-to-use payment system was a key factor in making ransomware the phenomenon it is today.
Lance Cottrell's picture
The internet drives much of the world’s intelligence gathering, but its rapid evolution and lack of flexible policy-making is affecting how analysts do their jobs.
Markus Jakobsson's picture
While there are no signs today of criminals consolidating and reselling data from different breaches, it is an obvious concern as the value-add of the packaging would be substantial.
Josh Lefkowitz's picture
Retailers need relevant, actionable intelligence that can help them gain a decision advantage over the threats and adversaries they face year-round -- not just during the holiday shopping season.
Alastair Paterson's picture
The holiday season is in full swing and once again we can expect to see a surge in cyber attacks targeting retailers and consumers.
Siggi Stefnisson's picture
When disaster strikes, cyber criminals are always right behind, ready to apply social engineering techniques to take advantage of both the victims and people wishing to help.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?