Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Tech support scammers are exploiting an unpatched bug in Firefox to lock the web browser. [Read More]
A Long Island firm sold tens of millions of dollars in Chinese-made surveillance and other sensitive security equipment to customers, including the U.S. military to use on aircraft carriers, by falsely claiming the goods were manufactured in America. [Read More]
Ecommerce fraud prevention solutions provider Riskified has raised $165 million in a Series E funding round at a valuation of over $1 billion. [Read More]
Trend Micro has disclosed an insider threat incident that involved an employee selling information on roughly 100,000 customers to tech support scammers. [Read More]
Vendor email compromise is a troubling new trend in which fraudsters use hijacked employee email accounts to target not just one company, but entire supply chain ecosystems. [Read More]
Bed Bath & Beyond says the accounts of less than 1% of its customers have been hacked in an attack that involved credentials obtained from third-party breaches and password reuse. [Read More]
U.S. fast-food restaurant chain Krystal is investigating a payment card breach that appears to impact at least 200 of its locations. [Read More]
Malwarebytes has found sufficient evidence to suggest that Magecart 5 is really the APT group known as Carbanak. [Read More]
Fake checkra1n iOS jailbreak used as part of a sophisticated click fraud scheme that could pave the way for far more malicious actions. [Read More]
Anthony Tyler Nashatka, aka psycho, appeared in a US federal court on charges related to his involvement in a scheme aimed at defrauding victims of at least $1.4 million in cryptocurrency. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.