Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A group of cybercriminals managed to hide their web skimmer in the EXIF metadata of an image that was then surreptitiously loaded by compromised online stores. [Read More]
Australian beverage company Lion says there is no evidence that hackers have stolen information from its systems, but the hackers claim they have and are threatening to leak it. [Read More]
Police in Germany have arrested 32 people and detained 11 after nationwide raids targeting users of an illegal online platform. [Read More]
A man who developed distributed denial of service (DDoS) botnets based on the source code of Mirai was sentenced to 13 months in federal prison. [Read More]
Foreign hackers are taking advantage of the coronavirus pandemic to undermine institutions and threaten critical infrastructure, a top U.S. military cyber official said Thursday, June 25, 2020. [Read More]
The cybercriminals behind the Maze ransomware claim they hacked LG and obtained highly sensitive information. [Read More]
A newly identified piece of malware is being distributed embedded in tax payment software that some businesses operating in China are required to install. [Read More]
Morocco says it is investigating a journalist for receiving "foreign funding" for "intelligence services" days after rights group Amnesty alleged the government had used Israeli spyware to bug his phone. [Read More]
Akamai has mitigated a second record-setting DDoS attack since the beginning of June, one that peaked at 809 MPPS. [Read More]
WikiLeaks founder Julian Assange sought to recruit hackers at conferences in Europe and Asia who could provide his anti-secrecy website with classified information, and conspired with members of hacking organizations, according to a new Justice Department indictment. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Alastair Paterson's picture
As we continue to gear up for an increase in shopping this holiday season, remember that attackers continue to innovate and update their training and skills regularly.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.