newsFive-country attack on cybercrooks welcomed by security expertArrest of 41 suspects more important than takedown of 22,000 malicious IP addresses, he argues.By Howard Solomon06 Nov 20246 minsCybercrimeLegal interview How Interpol is adapting to the ever-evolving cybercrime landscapeBy Mario Moreno25 Oct 20248 minsGovernment ITGovernmentCyberattacksnews Lockbit dismantling progressesBy Florian Maier02 Oct 20242 minsRansomwareCybercrime feature9 types of phishing attacks and how to identify themBy Fahmida Rashid and John Leyden 01 Oct 202411 minsPhishingCybercrimeData and Information Security newsGerman police dismantles illegal crypto exchangesBy Florian Maier 20 Sep 20242 minsCryptocurrencyCybercrime newsAustralian cops bust underworld app through compromised software updatesBy Shweta Sharma 18 Sep 20244 minsHackingCybercrime featureTop 10 ransomware groups to watchBy Lucian Constantin 16 Sep 202412 minsRansomwareEncryptionCybercrime analysisThe 18 biggest data breaches of the 21st centuryBy Michael Hill, Dan Swinhoe and John Leyden 12 Sep 202418 minsData BreachPhishingRSA Conference newsThe US offers a $2.5M bounty for the arrest of Angler Exploit Kit co-distributorBy Shweta Sharma 29 Aug 20243 minsHackingCybercrime ArticlesnewsRansomware attack paralyzes milking robots — cow deadAfter an attacker paralyzed his computer, a farmer from Switzerland was no longer able to read his cows’ vital data, resulting in the death of one of his herd.By Martin Bayer 07 Aug 2024 2 minsRansomwareAgriculture IndustryCybercrimenews analysisNorth Korean group infiltrated 100-plus companies with imposter IT pros: CrowdStrike reportThe DPRK group’s attempts to exfiltrate data and install RMM tools by posing as US IT workers is one of several examples that show cross-domain analysis is needed to tackle rising identity-based attacks, according to CrowdStrike’s counter adversary team, as the company reels in the worldwide outage’s wake.By Cynthia Brumfield 06 Aug 2024 8 minsCyberattacksThreat and Vulnerability ManagementCybercrimenewsWho are the two Russian convicts released in the US-Russia prisoner swap?The US had to let go of two notorious Russian cybercriminals charged with high-profile hacking operations in its territory. By Shweta Sharma 02 Aug 2024 3 minsCybercrimefeatureHow cybercriminals recruit insiders for malicious actsCriminal attackers view your employees as potential accomplices to transform into insider threats. Here’s who they target, how they recruit them, and what they want malicious insiders to do to help compromise IT systems.By Dov Lerner 16 Jul 2024 17 minsCybercrimefeatureLogic bombs explained: Definition, examples, preventionA logic bomb is malicious code that waits for the right time or opportunity to strike. Some infamous examples show the potential for damage.By Josh Fruhlinger 05 Jul 2024 12 minsMalwareCybercrimeSecuritybrandpostSponsored by CyberArkUnderstanding APIs and how attackers abuse them to steal dataProperly securing APIs will help your organization defend against cyberattacks, drive operational efficiencies, satisfy audit and compliance requirements and enable innovation.By John Walsh, senior product marketing manager at CyberArk 24 Jun 2024 5 minsCybercrimebrandpostSponsored by CyberArkWhy identity security Is essential to cybersecurity strategyIdentity security as the foundation of cyber resilience, ensuring organizations are well-equipped to protect against cyber threats.By Claudio Neiva, CyberArk’s Field Technology Director (LATAM), PAM and Identity Security 24 Jun 2024 6 minsCybercrimenewsScattered Spider arrest in Spain unlikely to stop cybercrime groupExpect only a short-term reduction in attacks on enterprises from the group, warns former FBI agent.By John Leyden 18 Jun 2024 4 minsCybercrimebrandpostSponsored by CyberArkThe growing threat of identity-related cyberattacks: Insights into the threat landscapeNew CyberArk research finds the rise of machine identities and increasing reliance on third-party providers is deepening threats and creating novel vulnerabilities.By Brandon Traffanstedt, senior director in CyberArk’s Field Technology Office 14 Jun 2024 6 minsCybercrimefeatureDeepfakes: Coming soon to a company near youAI-powered deepfake technology is rapidly advancing, and it’s only a matter of time before cybercriminals find a business model they can use, some security experts say.By Grant Gross 14 Jun 2024 8 minsPhishingCybercrimenewsMicrosoft: The brand attackers love to imitateCybercriminals often hide attack attempts behind well-known brand names with the intent to trick targeted users into making the fatal click. Microsoft is their favorite — by far.By Martin Bayer 03 Jun 2024 3 minsPhishingEmail SecurityCybercrimenews‘Operation Endgame’ deals major blow to malware distribution botnetsThe law enforcement operation has disrupted key infrastructure of the cybercrime ecosystem in what may be the largest botnet takedown of all time.By Lucian Constantin 30 May 2024 4 minsBotnetsMalwareCybercrime Show more Show less View all Resources whitepaper Global Data Insights Survey 67% of respondents are executing data strategies that guide IT infrastructure investments, but 52% cite a lack of sufficient investment in infrastructure is a top obstacle. The post Global Data Insights Survey appeared first on Whitepaper Repository –. By Digital Realty Trust, L.P. 25 Oct 2024Artificial IntelligenceBusiness OperationsEnterprise whitepaper The State of Data and AI in Europe By Digital Realty Trust, L.P. 25 Oct 2024Artificial IntelligenceBusiness OperationsEnterprise whitepaper Harnessing a modern SIEM to build a cost-efficient, resilient & intelligent SOC to avoid revenue impact and outages By Sumo Logic 07 Oct 2024Business OperationsSecurity Information and Event Management SoftwareSecurity Operations Center View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsPhishingEmail ClientsCybercrime An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsPhishingEmail ClientsCybercrime Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 PhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Androxgh0st botnet integrates Mozi payloads to target IoT devices By Lucian Constantin 08 Nov 20245 mins BotnetsThreat and Vulnerability ManagementVulnerabilities news US consumer protection agency bans employee mobile calls amid Chinese hack fears By Gyana Swain 08 Nov 20244 mins Hacking opinion Choosing AI: the 7 categories cybersecurity decision-makers need to understand By Christopher Whyte 08 Nov 202410 mins CSO and CISOSecurity PracticesSecurity Software podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1) 04 Nov 202419 mins Supply ChainCritical InfrastructureSecurity video CSO Executive Sessions: Standard Chartered’s Alvaro Garrido on cybersecurity in the financial services industry 23 Oct 202410 mins Financial Services IndustrySecurity video CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure 16 Oct 202412 mins Critical InfrastructureSecurity