Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Malwarebytes said it was targeted by the state-sponsored threat actor that breached SolarWinds. [Read More]
Security researchers see 5,447 devices still connecting to a sinkholed VPNFilter C&C domain on a single day. [Read More]
Symantec researchers have uncovered another piece of malware used in the SolarWinds attack, namely Raindrop, which has been used for lateral movement and payload deployment. [Read More]
The OpenWrt Project said someone breached its forum over the weekend and downloaded user information. [Read More]
In one attack, the cybercriminals found an employee via the company’s chatroom and then convinced them to log into a fake VPN page to reveal their credentials. [Read More]
Going after high profile victims appears to have allowed Ryuk ransomware operators to build a highly lucrative malware enterprise. [Read More]
The carding shop says it plans to close operations on February 15, 2021. [Read More]
The European Union’s drug regulator said that COVID-19 vaccine documents stolen from its servers by hackers have been not only leaked to the web, but “manipulated.” [Read More]
The company sued two individuals for using browser extensions to scrape user profiles and other information from its website. [Read More]
Over 40 scam groups leverage the Classiscam scheme in Russia, the U.S., and Europe, and in 2020 they made $6.5 million. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Joshua Goldfarb's picture
For any fraud detection solution to be practical, it must be easily integrated into security and fraud operations.
Derek Manky's picture
2020 has taught us to revisit the practice of inspecting encrypted traffic. These are all standard security protocols to step up in light of what cybercriminals are doing now.
Idan Aharoni's picture
With law enforcement’s ability to adapt, showing consistent results despite cybercriminals’ adoption of new technologies, as well as the increase in awareness of cyber attacks, there’s still a room for optimism – not only for the next year, but also for the next decade.
Joshua Goldfarb's picture
Facts, data, and evidence are extremely important to properly detecting, preventing, and investigating both security incidents and fraud incidents.
Joshua Goldfarb's picture
Playing whack-a-mole with malicious code infections, phishing sites, and compromised credentials won’t help an enterprise reduce losses due to fraud.
Idan Aharoni's picture
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.