Chinese Cybercrime Develops Lucrative Hacking Services
The McAfee blog gave an interesting perspective on an area we do not look at too closely normally. Underground cybercrime profits in China have likely already exceeded US$15.1 billion ...
We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.
The McAfee blog gave an interesting perspective on an area we do not look at too closely normally. Underground cybercrime profits in China have likely already exceeded US$15.1 billion ...
If you think 2017 was bad, hold on for dear life because 2018 is going to be the worst yet when it comes to cyber attacks, with new and better coordinated attacks looming large. Why? ...
The cost of non-compliance has significantly increased over the past few years, and the issue could grow more serious. 90 percent of organizations believe that compliance with the GDPR ...
A previously unknown ring of Russian-speaking hackers has stolen as much as $10 million from U.S. and Russian banks in the last 18 months, according to a Moscow-based cyber-security firm ...
David Patriakos's new book about cyber warfare is a fascinating read. From the back cover: "Modern warfare is a war of narratives, where bullets are fired both physically and virtually. ...
Kon Leong at Harvard Business Review wrote an excellent article about the problem of employees exposing your organization to cyberthreats through human error. Here is a short qoute:
Criminal hacking group The Dark Overlord is threatening to leak the internal client data of top Hollywood production studio Line 204, IBTimes UK has learned. The seemingly international ...
"European Union member states have drafted a diplomatic document which states serious cyber-attacks by a foreign nation could be construed as an act of war. The document, said to have ...
Georgia Tech researchers reported that hackers are using a technique identified with a newly coined term "combosquatting" to trick users into visiting malicious websites. Sorry to break ...
Tawnell D. Hobbs at the Wall Street Journal wrote: "Hackers looking to exploit sensitive information for profit are increasingly targeting the nation’s schools, where they are finding a ...
This could be a headline on a dark web site for cyber criminals. And it would be correct. Our colleagues at Wombat did some digging and came up with relevant research you should know ...
Cisco's TALOS security researchers discovered a devious way to infect millions of machines. They said: "Supply chain attacks are a very effective way to distribute malicious software into ...
Lucinda Shen at Fortune wrote: "With an uptick in cyberattacks across the world, from WannaCry to Petya ransomware, a new report from banking heavyweight Lloyds of London warns just how ...
Steve Morgan wrote an excellent post with the Top 5 cybersecurity facts, figures and statistics for 2017 at the CSO site. These predictions and observations provide a 30,000-foot view of ...
There is a rising trend of cybercrime sites for wannabe "crims" that make malicious hacking a point-and-click exercise. A new report describes two more sites that were discovered by ...
Yesterday morning, after monitoring this new outbreak for 24 hours, I came to the conclusion we were dealing with cyber warfare , and not ransomware . Two separate reports coming from ...
OK, after 24 hours of monitoring this new Petya ransomworm outbreak, I am calling it. This has been brewing under the surface for a few years, but now we are dealing with open cyber ...
The WSJ just posted a very interesting article by Nathan Hodge confirming what we have been saying here for the last few years. Russian President Vladimir Putin suggested in St Petersburg ...
The mysterious Shadow Brokers – the hackers who leaked the NSA SMB zero-day exploit that powered WanaCry into the world's worst ransomworm – are back, and could cause even more damage. In ...
The National Institute of Standards and Technology (NIST) has issued a draft update (PDF) to the Framework for Improving Critical Infrastructure Cybersecurity—also known as the ...