brandpostSponsored by Sophos Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacksSep 21, 20233 minsCybercrime news analysis AWS cryptojacking campaign abuses less-used services to hideBy Lucian ConstantinSep 18, 20236 minsMalwareCloud SecurityCybercrimenews analysis Hacker group compromises MSSQL servers to deploy FreeWorld ransomwareBy Lucian ConstantinSep 01, 20234 minsHacker GroupsRansomwareCybercrime news analysisQakbot infrastructure dismantled in multinational cybercrime takedownBy Michael Hill Aug 30, 20235 minsBotnetsMalwareCybercrime newsSuspected Met Police data breach potentially exposes sensitive officer, staff informationBy Michael Hill Aug 29, 20233 minsData BreachData PrivacyCybercrime newsUK court finds teenagers guilty of carrying out LAPSUS$ hacking spreeBy Michael Hill Aug 24, 20232 minsHacker GroupsCybercrime news analysisClop ransomware dominates ransomware space after MOVEit exploit campaignBy Lucian Constantin Aug 23, 20234 minsRansomwareCybercrime feature6 best practices to defend against corporate account takeover attacksBy Linda Rosencrance Aug 17, 202310 minsBusinessCyberattacksCybercrime newsUK police data breach exposes victim informationBy Michael Hill Aug 15, 20233 minsData BreachIdentity TheftLegal ArticlesnewsEncrochat bust leads to 6,500 arrests, seizure of $1B in assetsAn international investigation intercepted and analyzed over 115 million conversations that took place over the encrypted messaging platform among more than 60,000 users. By Apurva Venkat Jun 28, 2023 4 minsCommunications SecurityCybercrimenews analysisMicrosoft Office 365 AitM phishing reveals signs of much larger BEC campaignThis newly discovered, global campaign indicates growing popularity for multi-stage adversary-in-the-middle tactics among threat actors.By Lucian Constantin Jun 14, 2023 5 minsPhishingEmail SecurityCybercrimenews analysisBusiness email compromise scams take new dimension with multi-stage attacksA new attack group leverages trusted relationships between partner organizations to bypass multifactor authentication.By Lucian Constantin Jun 12, 2023 6 minsEmail SecurityCyberattacksCybercrimenews analysisClop extortion gang gives MOVEit exploit victims one week to reach outAt least 20 organizations have been compromised by Clop's MOVEit exploit, according to new research.By Lucian Constantin Jun 07, 2023 5 minsRansomwareCyberattacksCybercrimefeatureWhat is the Cybercrime Atlas? How it can help disrupt cybercrimeThe Cybercrime Atlas aims to map the cybercriminal ecosystem worldwide and allow global law enforcement agencies to access that information when fighting cybercrime. By Samira Sarraf Jun 01, 2023 6 minsCyberattacksCybercrimeopinionWhat cybersecurity professionals can learn from the humble antWhen ants work together to defend their colony, it’s all for one and one for all. This model could help forge an immediate global, coordinated, and effective response to cyberattacks.By Christopher Burgess May 22, 2023 5 minsCSO and CISOGovernmentCybercrimebrandpostSponsored by NTTCyberattacks: How to strengthen your security, fastBy Sean Duffy, Vice President: Go-to-Market Cybersecurity at NTT May 19, 2023 5 minsCyberattacksCybercrimenewsRussian national indicted for ransomware attacks against the USMikhail Pavlovich Matveev is charged with conspiring to transmit ransom demands, conspiring to damage protected computers, and intentionally damaging protected computers.By Apurva Venkat May 18, 2023 4 minsRansomwareLegalCybercrimenews analysisNew ransomware gang RA Group quickly expanding operationsThe RA Group uses double extortion and has detailed information on its victims.By Lucian Constantin May 15, 2023 4 minsRansomwareCyberattacksCybercrimenews analysisLaw enforcement crackdowns and new techniques are forcing cybercriminals to pivotResearchers say that law enforcement crackdowns and new investigative tools are putting pressure on cybercriminals, but challenges for defenders remain.By Cynthia Brumfield May 15, 2023 7 minsRansomwareBlockchainCybercrimenews analysisIsraeli threat group uses fake company acquisitions in CEO fraud schemesThe group targets multinational firms using email display name spoofing and multiple fake personas.By Lucian Constantin May 11, 2023 6 minsEmail SecurityCybercrimenews analysisNew ransomware group CACTUS abuses remote management tools for persistenceThe CACTUS cybercriminal group targets VPN appliances for initial access and to install a backdoor.By Lucian Constantin May 08, 2023 4 minsRansomwareCybercrime Show more Show less View all Upcoming Events02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity View all events Resources whitepaper Cyber Liability Insurance: What You Need to Know Cyber liability insurance can be a lifeline in the event of a major incident or breach. Cyber incidents rose 35% in 2020 alone with data breaches costing $4.24 million per year, resulting in cyber insurance premiums jumping up by 50-100%. The post Cyber Liability Insurance: What You Need to Know appeared first on Whitepaper Repository. By DynTek and Cisco Systems 21 Sep 2023Business OperationsCybercrimeData and Information Security whitepaper On-Demand Webcast | You've Had a Ransomware Attack... So Now What? By Cohesity 18 Sep 2023Business OperationsCybercrimeData Privacy whitepaper Defend Your Data from a Ransomware Attack: 3 Ways Cohesity Next-Gen Data Management Improves Cyber Resilience By Cohesity 18 Sep 2023Business OperationsCybercrimeData and Information Security View all Video on demand videoWhat is inside a hacker's backpack?To help raise awareness about the types of tools hackers are using to eavesdrop or break into different systems, we chat with Etay Maor, an adjunct professor of cybersecurity at Boston College and an industry-recognized cybersecurity researcher. Knowing some of these tricks can help consumers and other professionals better secure their homes and offices. Guest: Etay Maor, adjunct professor of cybersecurity at Boston College, and industry-recognized cybersecurity researcher. Sep 06, 2023 33 minsHackingCybercrime Generative AI a hot topic at Black Hat Sep 06, 2023 27 minsGenerative AIEventsCybercrime An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41 Aug 08, 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 Aug 07, 2018 15 minsPhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis DHS unveils one common platform for reporting cyber incidents By Cynthia Brumfield Sep 25, 202310 mins RegulationRegulationRegulation news Chinese state actors behind espionage attacks on Southeast Asian government By Shweta Sharma Sep 25, 20234 mins Advanced Persistent ThreatsCyberattacks feature How to pick the best endpoint detection and response solution By Linda Rosencrance Sep 25, 202310 mins Intrusion Detection SoftwareSecurity Monitoring SoftwareData and Information Security podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO