Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Members of the cybercriminal group behind the infamous Dridex Trojan have split from the gang and released a forked version of the BitPaymer ransomware, CrowdStrike reports. [Read More]
Clemson and other universities are working to improve cybersecurity. [Read More]
LaPorte County in Indiana paid a ransom of over $130,000 demanded by cybercriminals who managed to infect its systems with a piece of ransomware. [Read More]
Ransomware has been a thorny cybersecurity issue for several years, and experts debate weather. organizations should pay or not pay ransomware demands. [Read More]
Many new electoral systems still run on old software that will soon be outdated and more vulnerable to hackers. [Read More]
Chinese telecoms giant Huawei is reportedly planning to make major job cuts at its US-based research and development arm, Futurewei. [Read More]
Bipartisan legislation would require the Department of Homeland Security to send notifications on breaches affecting the election systems. [Read More]
United States Conference of Mayors, which represents over 1,400 mayors from cities with a population of at least 30,000, promises not to pay ransomware demands. [Read More]
Tokyo-based cryptocurrency exchange BITPoint said it had halted all services after losing cryptocurrency worth more than $32 million in the latest apparent hack involving virtual money. [Read More]
Hackers breached the archive server for the Pale Moon open source web browser and infected all .exe files with malware. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Grady Summers's picture
The 2020 elections will be hotly contested, and the integrity of the election will need to be beyond repute to ensure citizens confidence in a free and fair election.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.