Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The U.S. has charged six Russian intelligence officers for their role in several major cyberattacks attributed to the Sandworm group, including the NotPetya, Industroyer and Olympic Destroyer attacks. [Read More]
Google says its Threat Analysis Group (TAG) hasn’t observed any significant coordinated influence campaigns that are targeting United States voters on its platform. [Read More]
A Russian goes on trial in Paris Monday accused of having defrauded nearly 200 victims across the world of 135 million euros using ransomware. [Read More]
Google has revealed that its infrastructure was targeted in a record-breaking 2.5 Tbps DDoS attack in 2017. [Read More]
Dickey’s Barbecue Pit has launched an investigation after learning that cybercriminals may have stolen 3 million payment cards used at its restaurants. [Read More]
Law enforcement agencies in 16 countries worked together to dismantle a criminal network involved in the laundering of money from high-level cybercriminals. [Read More]
Hackers needed roughly 24 hours to take over high-profile Twitter accounts in the July attack, a report from the New York Department of Financial Services reveals. [Read More]
Iran-linked state-sponsored threat actor 'Silent Librarian' has launched another phishing campaign targeting universities around the world. [Read More]
Twitter was restored Thursday evening after a technical problem caused a global outage of nearly two hours on the social media platform used by hundreds of millions worldwide. [Read More]
European and American officials have arrested 20 individuals for allegedly belonging to an international ring that laundered millions. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Idan Aharoni's picture
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Justin Fier's picture
CISA has recently designated many cyber security positions ‘essential roles', and our understanding of essential businesses and essential employees will continue to change as the pandemic evolves.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.