Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A class action lawsuit filed against Samsung alleges that the company unnecessarily collected user data, then stored and sold it without proper security protections. [Read More]
Australian police are investigating a purported hacker’s release of the stolen personal data of 10,000 Optus customers and demand for a $1 million ransom in cryptocurrency. [Read More]
Russian President Vladimir Putin has granted Russian citizenship to former U.S. security contractor Edward Snowden, according to a decree signed Monday by the Russian leader. [Read More]
The Ukrainian government is proactively warning that Russia is planning “massive cyberattacks” against critical infrastructure targets in the energy sector. [Read More]
Hackers who crippled a French hospital and stole a trove of data last month have released personal records of patients online, officials have confirmed. [Read More]
American Airlines discovered it was breached after receiving reports of employee email accounts being used in phishing attacks. [Read More]
A 17-year-old from the UK has been arrested on suspicion of hacking for his alleged involvement in the recent Rockstar Games and Uber hacks. [Read More]
Ukrainian authorities take down a hacking group that compromised roughly 30 million user accounts and sold them on dark web portals. [Read More]
Microsoft has dismantled a malicious campaign in which OAuth applications deployed on compromised cloud tenants were used to distribute spam messages. [Read More]
Hacktivists might not know a lot about ICS, but they’re well aware of the potential implications of hacking these devices, and some groups have been targeting ICS to draw attention to their cause. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Derek Manky's picture
Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them.
Landon Winkelvoss's picture
Organizations need to be able to go outside the firewall to gather as much threat actor information as possible to build robust internal defenses against fraud.
Laurence Pitt's picture
Between the excitement and the comfort of working from home, it can be easy to overlook the risks associated with summer travel, but it’s important to remain careful and vigilant.
Derek Manky's picture
We hear a lot about drug mules, but what are cyber mules? It’s similar to how drug dealers rely on unsuspecting or otherwise vulnerable people to help them transport drugs or launder the proceeds of those sales.
Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.