Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A ransomware attack that hobbled a Georgia county government in early October reportedly disabled a database used to verify voter signatures in the authentication of absentee ballots. [Read More]
The Iran-linked cyber-espionage group known as Seedworm appears to have added a new downloader to its arsenal and to have started conducting destructive attacks. [Read More]
The FBI and CISA say the Russian state-sponsored hacking group Energetic Bear has successfully compromised government networks and stole data from at least two servers. [Read More]
The European Union on Thursday imposed sanctions on two Russian officials and part of Russia’s GRU military intelligence agency over a cyberattack against the German parliament in 2015. [Read More]
A database with information on virtually the entire US voting population has been circulated on hacker forums, opening up the potential for disinformation and scams. [Read More]
Malwarebytes security researchers have identified a new campaign in which tech support scammers are exploiting an XSS vulnerability and are relying exclusively on links posted on Facebook to reach potential victims. [Read More]
Former NSA contracted turned traitor and fugitive Edward Snowden has been granted permanent residency in Russia, his lawyer said. [Read More]
The German government Wednesday agreed to allow secret services to listen in on conversations via encrypted messaging services such as Messenger or Whatsapp as a means of tackling terrorism. [Read More]
Officials say Russia and Iran have obtained some voter registration data, aiming to interfere in the November election. [Read More]
Most of the servers associated with the TrickBot botnet have been taken down following the technical and legal effort announced last week, Microsoft says. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Idan Aharoni's picture
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Justin Fier's picture
CISA has recently designated many cyber security positions ‘essential roles', and our understanding of essential businesses and essential employees will continue to change as the pandemic evolves.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.