Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A threat actor specializing in business email compromise (BEC) attacks has been spotted exploiting a vulnerability to spoof the domains of Rackspace customers. [Read More]
Malwarebytes security researchers have identified a new campaign in which tech support scammers are exploiting an XSS vulnerability and are relying exclusively on links posted on Facebook to reach potential victims. [Read More]
The email from a political action committee seemed harmless: if you support Joe Biden, it urged, click here to make sure you’re registered to vote. [Read More]
A Russian goes on trial in Paris Monday accused of having defrauded nearly 200 victims across the world of 135 million euros using ransomware. [Read More]
The United States this week announced that it seized a total of 92 domain names that an Iran-linked adversary was leveraging in a global disinformation campaign. [Read More]
The United States Department of Justice on Monday unsealed an indictment that charges John David McAfee with tax evasion. [Read More]
Hackers associated with the “Fullz House” group have compromised the website of Boom! Mobile and planted a web skimmer. [Read More]
Facebook on Thursday released a detailed technical report on a malware campaign that targeted its ad platform for years. [Read More]
A newly detailed business email compromise (BEC) campaign has resulted in more than $15 million being diverted from at least 150 organizations worldwide. [Read More]
Twitter on Wednesday announced that it removed 130 accounts originating from Iran that were aimed at disrupting the first 2020 U.S. presidential debate. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.