Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Lafayette, Colorado, officials announced Tuesday the city’s computer systems were hacked and they were forced to pay a ransom to regain access. [Read More]
A Florida teen identified as the mastermind of a scheme that gained control of Twitter accounts of prominent politicians, celebrities and technology moguls pleaded not guilty on Tuesday to multiple counts of fraud. [Read More]
The U.S. government has attributed a piece of malware named Taidoor, which has been around for more than a decade, to threat actors sponsored by the Chinese government. [Read More]
Global police body Interpol warned Monday of an "alarming" rate of cybercrime during the coronavirus pandemic, with criminals taking advantage of people working from home to target major institutions. [Read More]
A judge in Paris has ordered a French trial for Alexander Vinnik, a Russian suspected of money laundering on the bitcoin exchange BTC-e, also wanted by Washington and Moscow. [Read More]
BlackBerry announced PE Tree, a new open source tool to help security teams reverse engineer malware. [Read More]
Federal authorities say one of the gravest threats to the November election is a well-timed ransomware attack that could paralyze voting operations. [Read More]
As the Nov. 3 presidential vote nears, there are fresh signs that the nation’s electoral system is again under attack from foreign adversaries. [Read More]
Court documents show how two of the alleged Twitter hackers were identified by investigators based on Bitcoin transactions and other evidence. [Read More]
US prosecutors announced they have charged three people, one of them from Britain, for roles in hijacking celebrity Twitter accounts and tricking people out of money. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Justin Fier's picture
CISA has recently designated many cyber security positions ‘essential roles', and our understanding of essential businesses and essential employees will continue to change as the pandemic evolves.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
The holidays are also a bonanza for cybercriminals whose own sales and purchases of contraband on the dark web mirror the one-day-only specials of their consumer-facing counterparts.
Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.