cybercrime
TeslaCrypt ransomware pushed by several exploit kits
TeslaCrypt is one of the newest additions to the ransomware category of malware, and is being pushed out to users left and right. Aside from the usual assortment of file types …
New trend in cybercriminal activity: APT wars
Kaspersky Lab has recorded a rare and unusual example of one cybercriminal attacking another. In 2014, Hellsing, a small and technically unremarkable cyberespionage group …
Former lottery infosec head accused of hacking computers to buy winning ticket
The former head of information security at the Multi-State Lottery Association (MUSL), who was arrested in January 2015, stands accused of having tampered with the computer …
Main sources of data breaches: Phishing, RAM scrapers, web app insecurity
US telecom giant Verizon has published its 2015 Data Breach Investigations Report, which is based on an analysis of nearly 80,000 security incidents, including more than 2,100 …
Attackers use deceptive tactics to dominate corporate networks
Cyber attackers are infiltrating networks and evading detection by hijacking the infrastructure of major corporations and using it against them, according to Symantec. …
Simda botnet taken down in global operation
The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation. In a series of simultaneous actions around the …
Man gets 150 months in prison for selling stolen and counterfeit credit cards
A member of the identity theft and credit card fraud ring known as Carder.su was sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards over …
Polymorphic Beebone botnet sinkholed in international police operation
On April 8, a global operation targeted the Beebone (also known as AAEH) botnet, a polymorphic downloader bot which installs various forms of malware on victims’ …
Cybercrime gets easier, attribution gets harder
Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense. Redirect chains, code recycling and a …
Are you prepared for dealing with a breach?
RSA, The Security Division of EMC, released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey …
Cyber crooks go after enterprise millions with Dyre malware, social engineering
“An experienced and resource-backed cybercrime gang” is using the relatively new Dyre/Dyreza banking Trojan coupled with effective social engineering to steal …
US to enact sanctions against foreign cyber attackers
US president Barack Obama has signed on Wednesday a new executive order aimed at imposing “sanctions on individuals or entities that engage in malicious cyber-enabled …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader