Security Experts:

long dotted


A 17-year-old from the UK has been arrested on suspicion of hacking for his alleged involvement in the recent Rockstar Games and Uber hacks. [Read More]
Ukrainian authorities take down a hacking group that compromised roughly 30 million user accounts and sold them on dark web portals. [Read More]
Microsoft has dismantled a malicious campaign in which OAuth applications deployed on compromised cloud tenants were used to distribute spam messages. [Read More]
Hacktivists might not know a lot about ICS, but they’re well aware of the potential implications of hacking these devices, and some groups have been targeting ICS to draw attention to their cause. [Read More]
A new Sophos firewall zero-day vulnerability tracked as ​​CVE-2022-3236 has been exploited in attacks aimed at organizations in South Asia. [Read More]
Portugal’s national airline TAP Air Portugal says hackers obtained the personal data of some of its customers and have published the information on the dark web. [Read More]
Australian wireless carrier Optus discloses data breach impacting the personal information of both former and current customers. [Read More]
CISA and the FBI have provided information on the cyberattacks that Iranian APTs conducted against the Albanian government in July. [Read More]
European Parliament members investigating the use of surveillance spyware by European Union governments sharply criticized Israel for a lack of transparency in allowing the sale of powerful Israeli spyware to European governments. [Read More]
Recorded Future has identified 569 ecommerce domains infected with web skimmers, including 314 infected with a GTM-based skimmer variant. [Read More]


rss icon

Landon Winkelvoss's picture
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Joshua Goldfarb's picture
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
Derek Manky's picture
Botnets have become a fixture in the threat landscape, and are in a state of evolution as they learn and use newer, more evolved cybercriminal attack techniques.
Derek Manky's picture
Organization must remain hyper-vigilant and upgrade their defenses as thoroughly and quickly as possible.
Joshua Goldfarb's picture
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
Landon Winkelvoss's picture
Similar to investigations that disrupt cyberattacks on retailers, the same tactics, techniques, and procedures (TTPs) can be leveraged against those that sell counterfeit or stolen goods.
Derek Manky's picture
While the sky just may be the limit (or actually, it may not be), when it comes to cybercriminals, three key areas where we expect to see more activity in the coming year are space, digital wallets and esports.
Derek Manky's picture
Public and private entities need to collaborate by sharing threat information and attack data to make attacks more difficult and resource-intensive for cybercriminals.
Jeff Orloff's picture
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.
Derek Manky's picture
Botnets are becoming more malicious, sometimes able to create hundreds of thousands of drones that can attack a variety of machines, including Mac systems, Linux, Windows systems, edge devices, IoT devices, and so on.