Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A hacker has stolen files related to some AMD GPUs and they plan on making them all public unless they get paid. [Read More]
The official website of kitchen products maker Tupperware was hacked and the attackers planted malicious code designed to steal visitors’ payment card information. [Read More]
Apple this week announced that third-party cookies are now blocked by default in Safari on macOS, iOS and iPadOS. [Read More]
The FBI shut down a Russian-based online platform where various cybercrime products and services were being sold. [Read More]
A Chinese threat actor tracked as APT41 has targeted organizations worldwide by exploiting vulnerabilities in Citrix, Cisco and Zoho ManageEngine products. [Read More]
GE says the personal information of some employees may have been compromised as a result of a data breach suffered by Canon Business Process Services. [Read More]
A targeted and ongoing campaign first spotted last year has hit industrial organizations in the Middle East with a new Trojan. [Read More]
San Francisco, Calif-based Arkose Labs has raised $22 million in a Series B funding round led by the Microsoft venture fund, M12. [Read More]
Four major wireless U.S. carriers are developing a new single sign-on variant they believe will finally do away with passwords. [Read More]
Authorities in the United States and Europe have issued warnings of increased cyber-activity related to the ongoing COVID-19 (coronavirus) pandemic. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
The holidays are also a bonanza for cybercriminals whose own sales and purchases of contraband on the dark web mirror the one-day-only specials of their consumer-facing counterparts.
Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Jim Gordon's picture
At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.