Cybercrime

Cybercrime | News, how-tos, features, reviews, and videos

DDOS attack
A group of anonymous hooded figures exist amid raining streams of binary code. [security threats]

Dustin White, chief risk data officer, Visa

How Visa fights fraud

The financial services company has made massive investments in data and analytics to better detect and prevent fraud.

ransomware breach hackers dark web

5 years after NotPetya: Lessons learned

NotPetya vastly broadened the scope of damage that malware attacks could do and forced CISOs and security researchers to rethink their approach.

Double-exposure of a city and a businessman's silhouette containing the shadow of a strongman.

The strange business of cybercrime

How modern cybercrime syndicates adopt the ways of enterprise business, reaping the gains and suffering the difficulties.

A hand controls a small marionette. [control / manipulation / social engineering]

5 social engineering assumptions that are wrong

Cybercriminals continue to launch creative social engineering attacks to trick users. Meanwhile, social engineering misconceptions are exacerbating the risks of falling victim.

Compliance

How Microsoft Purview can help with ransomware regulatory compliance

Microsoft's renamed compliance portal provides guidance and rule-setting capability to help comply with ransomware and other security and privacy requirements.

Quantum computing / security

Defending quantum-based data with quantum-level security: a UK trial looks to the future

Telecommunications giant BT is testing secure quantum data transmission over a network in what could be a glimpse into the shape of things to come for cybersecurity in a quantum computing world

A multitude of arrows pierce a target. [numerous attacks / quantity / severity]

APT actor ToddyCat hits government and military targets in Europe and Asia

The previously undocumented APT group has been targeting high-profile organizations in Asia and Europe for over a year.

ransomware hack

Cato Networks offers new capability for network-based ransomware protection

New machine learning algorithms scan server traffic to detect and eliminate ransomware attacks across Cato's customer network.

1 network internet connected grid earth power satellite view

Space-based assets aren’t immune to cyberattacks

Russia's attack on Viasat satellites exposed how vulnerable space-based assets are and the potential for spillover damage.

hacker / cryptocurrency attack

Cryptojacking explained: How to prevent, detect, and recover from it

Cryptojacking is the unauthorized use of a computer to mine cryptocurrency. Here’s how it works, why it's so popular with criminal hackers, and what you can do to stop it.

Computerworld > Microsoft OneDrive / Microsoft SharePoint

Ransomware could target OneDrive and SharePoint files by abusing versioning configurations

A proof-of-concept exploit could make Office 365 or Microsoft 365 documents stored on OneDrive or SharePoint inaccessible.

stress test2 linux penguin stress ball hand squeezing by digitalsoul getty images 1136841639

Nebulon bakes bare-metal Linux ransomware protection into the bootloader

The newest releases of Nebulon’s ImmutableBoot and TimeJump backup systems boast 'reboot-to-recover' functionality for Linux systems.

CSO  >  Botnet  >  Robots amid a blue binary matrix

New peer-to-peer botnet Panchan hijacks Linux servers

The botnet built by the platform-independent worm malware currently enables cryptomining.

CSO  >  ransomware / security threat

Ransomware attacks are increasing with more dangerous hybrids ahead

The re-emergence of REvil and anticipated convergence with business email compromise actors are among reasons why ransomware gangs are still dangerous.

A hand controls a small marionette. [control / manipulation / social engineering]

Threat actors becoming more creative exploiting the human factor

Remote work, supply chains, commercial clouds offer threat actors opportunities to trick people into doing their bidding.

job search machine learning ai artifical intelligence robotics automation

9 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

CSO  >  What is a computer virus?

9 types of computer virus and how they do their dirty work

From macro viruses and boot sector viruses to droppers and packers, here’s a look at 9 common virus types, what they do, and the function they perform for attackers.

2 linux malware scarier

Hackers using stealthy Linux backdoor Symbiote to steal credentials

Symbiote is deployed as a shared object that can inject itself into existing processes, making it difficult to detect.

Load More