Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A new threat actor tracked as Panda has generated thousands of dollars in Monero using RATs and cryptocurrency mining malware. [Read More]
Bochum, Germany-based VMRay has closed a $10 million Series B funding round led by Digital+ Partners, bringing the total raised to date to just under $14 million [Read More]
Recently discovered cryptocurrency mining malware targeting Linux machines is employing kernel-mode rootkits in an attempt to make detection more difficult. [Read More]
Australia reportedly determined that China hacked its parliament and political parties, but decided not to make public accusations to avoid disrupting trade relations. [Read More]
InnfiRAT RAT can steal various types of data from infected machines, including personal data and cryptocurrency wallet information. [Read More]
Edward Snowden, the National Security Agency contractor living in Russia after leaking information about the US government's mass surveillance program, has said he would like to return home if he can get a fair trial. [Read More]
The question now is not whether there will be foreign attempts against the 2020 elections, but what can be done to protect the vote. [Read More]
Researchers from an Israeli threat intelligence firm SenseCy discovered a new Android RAT called MobiHok that was built using recycled source code from the MobeRat malware. [Read More]
Whistleblower Edward Snowden, living in Russia since leaking a trove of classified documents showing the scope of post-9/11 US government surveillance, wants to claim asylum in France. [Read More]
British police said Friday they had arrested a 19-year-old man for stealing unreleased songs from musicians' websites and cloud-based accounts, as part of a US-led investigation. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.