Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Diana Lebeau of Cranston, Rhode Island, admitted in court to attempting to trick candidates for political office into revealing their account credentials. [Read More]
Operating systems have been restored at South Africa's state-owned logistics firm, the company said Thursday following a cyber-attack last week that hit the country's key port terminals. [Read More]
The two individuals are believed to have stolen more than $270,000 from dozens of ATMs. [Read More]
Guardicore Labs provides full details on CVE-2021-28476, a critical vulnerability in Hyper-V’s virtual network switch driver. [Read More]
Hacking tool downloads from underground forums are increasing, and the tools are becoming more sophisticated; low-level hackers are gaining access to hacked versions of sophisticated tools; access broking is growing; and existing tools are repurposed for more aggressive attacks. [Read More]
Classified files apparently leaked from an Iranian cyber unit show that the country is looking to improve its offensive cyber capabilities, including against ICS. [Read More]
eCommerce fraud prevention company Riskified has priced its IPO at $21 per share and is hoping to raise more than $360 million. [Read More]
Foxit Software patches vulnerabilities that put users at risk of remote code execution attacks via specially crafted PDF files. [Read More]
A high-powered joint advisory calls attention to gaping holes in perimeter-type devices like VPN appliances, network access gateways and enterprise cloud applications. [Read More]
A cyberattack that crippled the computer systems of University of Vermont Health Network last fall happened after an employee opened a personal email on a company laptop while on vacation. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Keith Ibarguen's picture
Leveraging humans for detection makes it hard for the attackers to predict whether or not their malicious emails will be identified and using technology to automate response provides scale and speed in resolution.
Idan Aharoni's picture
The fact that so many large and high-profile enterprises fall prey to ransomware attacks that in many cases does not pose any new technical challenge suggests that there are still many gaps that needs to be closed.
Derek Manky's picture
We tend to focus on the attack surface when it comes to cybersecurity, but the reality is, much like an iceberg, there’s so much more lurking beneath the surface.
Gordon Lawson's picture
Threat hunting must be non-attributable, while maintaining a clear audit trail to satisfy legal and governance requirements.
Idan Aharoni's picture
Fraudsters will determine who to target within the industry based on each service’s fraud prevention policies and maturity, rather than generally targeting the industry.
Idan Aharoni's picture
Taking down dark web sites may cause headache for both the bad guys and the good guys, but it can also have a profound positive effect on the fight against cybercrime.
Joshua Goldfarb's picture
Josh Goldfarb debunks the most common myths surrounding fraud, security and user experience.
Derek Manky's picture
Each side of the public-private collaboration has resources and capabilities that shore up the other and increase effectiveness in combatting cybercrime.
Tim Bandos's picture
The ransomware threat could still become more pervasive over the next two to three years, not because ransomware is effective in and of itself but because of other players in the game continue to fan the flames.
Laurence Pitt's picture
Over the coming weeks, we must be vigilant as there will be a glut of activity and misinformation from cybercriminals wanting to disrupt the COVID-19 vaccine rollout.