Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A new, massive Mirai-linked botnet is recruiting improperly secured IoT devices such as IP wireless cameras [Read More]
Hackers breach Eltima website and use it to deliver macOS RAT Proton via a trojanized version of Elmedia Player [Read More]
Russia-linked cyber espionage group APT28 uses recently patched Flash Player zero-day to attack government organizations and aerospace companies [Read More]
Tech giants including Google, Facebook and Twitter will come under pressure in Italy this week to go further and faster in helping G7 powers tackle the ever-greater threat of extremists online. [Read More]
Recently observed distribution campaigns featuring the Ursnif banking Trojan were using new malicious macro tactics for payload delivery [Read More]
New Magniber (Magnitude+Cerber) ransowmare delivered to users in South Korea via Magnitude exploit kit [Read More]
The head of the Australian Security Intelligence Organisation (ASIO) said it identified foreign powers clandestinely seeking to shape the opinions of members of the Australian public [Read More]
Carrier grade NATs (CGNs) used by some ISPs allow dozens, hundreds and perhaps even thousands of routers or computers or mobile devices to share a single IP address simultaneously. [Read More]
China-linked cyber espionage group uses recently patched .NET vulnerability in attacks aimed at a US shipbuilding firm and a university with military ties [Read More]
Many victims of the Equifax hack had their personal information stolen by cybercriminals prior to the breach, IRS says [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Jennifer Blatnik's picture
If the rest of the community would give hackers more of a chance before writing them off as evildoers, there would potentially be more incentives for capable people to go into the white hat hacking business.
Alastair Paterson's picture
The emergence of decentralized marketplaces within the criminal ecosystem poses significant challenges for law enforcement agencies and private security vendors.
Jack Danahy's picture
Awareness is not enough. Companies also need to dedicate themselves to protecting users and eliminating the blind spots caused by unpatched systems and a lack of strong endpoint protection.
Alastair Paterson's picture
As the opportunity for payment card fraud grows, it’s safe to assume that more cybercriminals will take advantage of new, sophisticated online courses to get a piece of the pie.
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
While President Trump’s executive order has laid an impressive and hopeful foundation for a more secure nation, its focus on bolstering federal defenses against large-scale cyber attacks and nation-state cyber threats is still too narrow.