Security Experts:

long dotted


Whistleblower Edward Snowden, living in Russia since leaking a trove of classified documents showing the scope of post-9/11 US government surveillance, wants to claim asylum in France. [Read More]
British police said Friday they had arrested a 19-year-old man for stealing unreleased songs from musicians' websites and cloud-based accounts, as part of a US-led investigation. [Read More]
Casey Viner, an Ohio gamer accused of recruiting a prankster to make a bogus emergency call, pleaded guilty for his alleged part in the hoax that got an unarmed Kansas man killed by police. [Read More]
The US Treasury on Friday placed sanctions on three North Korea government-sponsored hacking operations which it said were behind the theft of possibly hundreds of millions of dollars and destructive cyber-attacks on infrastructure. [Read More]
A ransomware incident in Flagstaff Arizona is being used as an example of how to prepare for and mitigate the effects of ransomware. [Read More]
Shape Security has raised a further $51 million in Series F growth funding, valuing the company at $1 billion. The total capital raised to date is now $183 million. [Read More]
A dropped, dubbed WiryJMPer and disguised as a virtual coin wallet, has been using heavy obfuscation in attacks delivering Netwire. [Read More]
President Benjamin Netanyahu on Thursday denied a media report that Israel spied on cell phones in the vicinity of the White House -- and President Donald Trump said he believed him. [Read More]
Fedir Hladyr, a 34-year-old Ukrainian accused of being the sysadmin of the FIN7 cybercrime group, pleaded guilty to hacking and wire fraud charges in Seattle. [Read More]
NSO Group, an Israeli spyware company that has been accused of helping authoritarian governments stifle dissent said it has adopted "a new human rights policy" to ensure its software is not misused. [Read More]


rss icon

John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.