Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A 24-year-old man from the UK has pleaded guilty to running services designed to help cybercriminals make their malware difficult to detect [Read More]
A new malware family is targeting web servers worldwide in an attempt to ensnare them into a crypto-mining botnet, security researchers have discovered. [Read More]
US authorities said Tuesday they had arrested a former CIA agent, Hong Kong resident Jerry Chun Shing Lee, after discovering he had an unauthorized notebook that had the identities of undercover US spies. [Read More]
Recorded Future has published details of a North Korean hacking campaign against South Korean interests, with particular emphasis on cryptocurrency exchanges, which does not yet appear to be active. [Read More]
Jordan Evan Bloom made his first court appearance to answer charges of running a website that collected personal and password data from some three billion accounts, and sold them for profit. [Read More]
Four malicious Chrome extensions managed to infect over half a million users worldwide, including employees of major organizations, ICEBRG reports. [Read More]
A new variant of the disk-wiper malware known as KillDisk has been spotted in attacks aimed at financial organizations in Latin America [Read More]
A malicious tool that managed to fly under the radar since April 2017 is showing great focus on obfuscation, in an attempt to evade detection, Palo Alto Networks warns. [Read More]
Cybercriminals are already taking advantage of the massive attention the recently detailed Meltdown and Spectre CPU flaws have received in order to spread malware. [Read More]
The World Economic Forum's Cyber Resilience Playbook for Public-Private Collaboration helps leaders develop a baseline understanding of the key issues and policy positions relating to cybersecurity and resilience. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Siggi Stefnisson's picture
I think it’s largely understood that the rise of a virtual, anonymized and easy-to-use payment system was a key factor in making ransomware the phenomenon it is today.
Lance Cottrell's picture
The internet drives much of the world’s intelligence gathering, but its rapid evolution and lack of flexible policy-making is affecting how analysts do their jobs.
Markus Jakobsson's picture
While there are no signs today of criminals consolidating and reselling data from different breaches, it is an obvious concern as the value-add of the packaging would be substantial.
Josh Lefkowitz's picture
Retailers need relevant, actionable intelligence that can help them gain a decision advantage over the threats and adversaries they face year-round -- not just during the holiday shopping season.
Alastair Paterson's picture
The holiday season is in full swing and once again we can expect to see a surge in cyber attacks targeting retailers and consumers.
Siggi Stefnisson's picture
When disaster strikes, cyber criminals are always right behind, ready to apply social engineering techniques to take advantage of both the victims and people wishing to help.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.