Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Retailer Target agrees to pay $18.5 million to 47 U.S. states as part of a settlement over the massive data breach suffered by the company in 2013 [Read More]
Qatar said Wednesday it had begun an inquiry into an unprecedented security breach by hackers who posted fake news stories attributed to its ruler on highly sensitive regional political issues. [Read More]
In a cyber intrusion dubbed Operation Cobalt Kitty, the OceanLotus hacking group -- otherwise known as APT32 -- played cat-and-mouse with a security firm that was tracking its every move. [Read More]
Qatar said Wednesday its official state news agency had been hacked by an 'unknown entity', and subsequently carried false remarks attributed to the country's Emir, Sheikh Tamim bin Hamad Al-Thani. [Read More]
The North Korea-linked Lazarus hacking group is "highly likely" to be responsible for the global "WannaCry" ransomware attacks, Symantec says. [Read More]
Russian authorities dismantle cybercrime gang responsible for infecting 1 million Android phones with a banking Trojan and stealing nearly $900,000 [Read More]
Most of the computers affected by the WannaCry ransomware outbreak were running Windows 7, security researchers have revealed. [Read More]
WikiLeaks detailed Athena, a malware developed by the CIA with a U.S. offensive-driven cybersecurity firm. The tool works on all versions of Windows [Read More]
Recent changes made to the Terror exploit kit (EK) allow it to fingerprint victims and target specific vulnerabilities instead of carpet bombing the victims with many exploits at the same time, Talos researchers discovered. [Read More]
China systematically dismantled CIA spying efforts in China beginning in 2010, killing or jailing more than a dozen covert sources, in a deep setback to US intelligence there, according to a report. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Alastair Paterson's picture
With elections coming up in the UK in June and Germany in September what type of cyber interference might we expect? And, more importantly, what steps can we take to mitigate risk?
Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.
Jennifer Blatnik's picture
By removing the allure of hacking, we can hopefully incentivize cybercriminals to instead use their skills in a positive way, to benefit not only themselves but also the greater good.
Alastair Paterson's picture
Bad actors will do whatever they can to take advantage of this potentially lucrative tax season – so beware the Ides of April.
Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.