Security Experts:

long dotted


A dataset allegedly containing 200 million unique sets of personally identifiable information (PII) exfiltrated from several popular Japanese website databases emerged on underground forums [Read More]
A 55-year-old man from New Mexico was sentenced to 15 years in prison for DDoS attacks on dozens of organizations and firearms charges [Read More]
US Justice Department announces more charges against two Syrians believed to be members of the Syrian Electronic Army hacker group [Read More]
A threat actor connected to the Iran-linked groups known as OilRig and Greenbug targets ICS networks in the Middle East and UK [Read More]
Hackers who targeted Mexico's interbank payment system made off with more than $15 million in the past several weeks, the Bank of Mexico said Wednesday. [Read More]
Latvian resident Ruslans Bondars, 37, was convicted by a U.S. jury on Wednesday for his role in the operation of the counter antivirus service Scan4You [Read More]
Serbian police said Wednesday they had arrested a man sought by the FBI under suspicion of being part of a group of cybercriminals who called themselves "The Dark Overlord". [Read More]
Ecuador spied on WikiLeaks founder Julian Assange at its London embassy where he has been living since 2012, according to a media report. [Read More]
A former CIA employee is believed to have provided WikiLeaks the Vault 7 files, which describe many of the hacking tools used by the intelligence agency [Read More]
White House eliminates cybersecurity coordinator role following the departure of Rob Joyce. Lawmakers and cybersecurity experts are not happy with the decision [Read More]


rss icon

Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Markus Jakobsson's picture
Men and women may jokingly refer to their significant other as their “partner in crime,” but when it comes to romance scams, this joke may become a sad reality.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
Oliver Rochford's picture
Cryptocurrencies have revolutionized the economics of cybercrime, with a noticeable impact on threat actors’ Tactics, Techniques and Procedures (TTP’s).
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.