Security Experts:

long dotted


The Iran-linked group tracked as APT33 uses obfuscated botnets for attacks aimed at high-value targets located in the United States, the Middle East and Asia. [Read More]
Australia announced measures to combat foreign interference at its universities Thursday, setting new guidelines around the key areas of research collaboration, cybersecurity, and international partnerships. [Read More]
Facebook said it has taken down roughly 5.4 billion fake accounts in 2019 in a sign of the persistent battle on social media against manipulation and misinformation. [Read More]
Canada's spy agencies are divided over whether or not to ban Chinese technology giant Huawei from fifth generation (5G) networks over security concerns. [Read More]
A Russian accused of running a website that helped people commit more than $20 million in credit-card fraud has been extradited to Virginia to face criminal charges. [Read More]
A newly discovered piece of ransomware written in PureBasic has been linked to a Malware-as-a-Service (MaaS) provider that has been used by Cobalt Gang, FIN6, and other threat groups. [Read More]
US customs officers cannot search the computers and phones of people arriving in America unless they have "reasonable suspicion," a federal judge ruled in a decision praised by rights activists. [Read More]
Mexican state-owned oil company Petróleos Mexicanos (Pemex) has suffered a ransomware attack that took down parts of its network. [Read More]
Tech support scammers are exploiting an unpatched bug in Firefox to lock the web browser. [Read More]
ASP.NET hosting provider SmarterASP.NET is currently working on recovering customer data after being hit by a ransomware attack over the weekend. [Read More]


rss icon

Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.