Police Arrest 1800 in Major Money Laundering Crackdown

Police Arrest 1800 in Major Money Laundering Crackdown

European police have identified over 18,000 money mules and arrested 1800 in a significant crackdown on money laundering. Some 27 countries took part in the seventh European Money Mule Action (EMMA 7), which ended yesterday, according to Europol. The two-and-a-half-month initiative saw police from these jurisdictions, along with Europol and Eurojust, work with the European Banking Federation (EBF), the FinTech FinCrime Exchange and private sector firms such as Western Union, Microsoft and Fourthline. The aim was…

Read More

LoRa takes a trip to the moon and back, chirping all the way

LoRa takes a trip to the moon and back, chirping all the way

LoRa is living up to its name, literally. A shortened version of “long range” (ironic!), LoRa is a wide-area wireless modulation technique that encodes information on radio waves. LoRa, which has been around since 2015, is derived from Chirp Spread Spectrum (CSS) technology and uses chirp pulses to transmit small bits of data. It also uses very little power. The proprietary technology is owned by semiconductor supplier Semtech Corp LoRa’s value is in transmitting data…

Read More

Russian Bulletproof Hosting Kingpin Gets Five Years

Russian Bulletproof Hosting Kingpin Gets Five Years

A Russian man has been sentenced to five years behind bars for his part in a bulletproof hosting venture that helped support countless cybercrime operations. Aleksandr Grichishkin, 34, and co-conspirators Pavel Stassi, 30, of Estonia, Aleksandr Skorodumov, 33, of Lithuania, and 34-year-old Russian, Andrei Skvortsov, had previously pleaded guilty to conspiracy to engage in a racketeer-influenced corrupt organization. Grichishkin is purportedly the organization’s founder, which rented out IP addresses, servers and domains to cyber-criminals, who…

Read More

Double Extortion Ransomware Victims Soar 935%

Double Extortion Ransomware Victims Soar 935%

Researchers have recorded a 935% year-on-year increase in double extortion attacks, with data from over 2300 companies posted onto ransomware extortion sites. Group-IB’s Hi-Tech Crime Trends 2021/2022 report covers the period from the second half of 2020 to the first half of 2021. During that time, an “unholy alliance” of initial access brokers and ransomware-as-a-service (RaaS) affiliate programs has led to a surge in breaches, it claimed. In total, the number of breach victims on ransomware data…

Read More

CIS Control 13: Network Monitoring and Defense | The State of Security

CIS Control 13: Network Monitoring and Defense | The State of Security

Networks form a critical core for our modern-day society and businesses. People, processes, and technologies should be in place for monitoring, detecting, logging, and preventing malicious activities that occur when an enterprise experiences an attack within or against their networks. Key Takeaways for Control 13 Enterprises should understand that their systems and networks are never perfectly immune to a cyberattack. Enterprises can leverage the safeguards provided by Control 13 to guide the evolution and maturity…

Read More

Reimagining mobile security for the way we live our lives today, tomorrow, and beyond.

Reimagining mobile security for the way we live our lives today, tomorrow, and beyond.

Online is a little different for everyone How do you connect online these days? I’ll give you an example from my own life: From my 15-year old son to my 80-year-old mother, not one of us leaves the house without our phone. And today, there isn’t a single thing you can’t do on your phone. It’s the minicomputer that goes where you go.  This trend in the way we connect is reflected in recent data too. In fact, we’ve found that the average consumer spends 6 hours…

Read More

Data Center Disaggregation 101 – How to Build a New Edge Computing Infrastructure

Data Center Disaggregation 101 – How to Build a New Edge Computing Infrastructure

As the data center continues to become more disaggregated, the data center itself is also becoming part of a larger distributed ecosystem that includes cloud resources and edge computing. With this shift comes the need to reshuffle IT assets. For companies that have for decades been locked into rigid, expensive single-vendor data center infrastructure, the prospect of disaggregation is extremely appealing. By separating hardware from software and deploying more modular units that can be mixed…

Read More

Final Member of ‘The Community’ Sentenced

Final Member of ‘The Community’ Sentenced

The United States has sent a fourth member of the international hacking group known as The Community to prison. Garrett Endicott of Warrensburg, Missouri, was the last of six defendants to be sentenced in connection with a multi-million-dollar SIM-swapping conspiracy that claimed victims across the country, including in California, Missouri, Michigan, Utah, Texas, New York and Illinois. Endicott, along with 22-year-old Conor Freeman of Dublin, Ireland; Ricky Handschumacher, 28, of Pasco County, Florida; Colton Jurisic, 22, of…

Read More

Final Member of ‘The Community’ Sentenced

Final Member of ‘The Community’ Sentenced

The United States has sent a fourth member of the international hacking group known as The Community to prison. Garrett Endicott, of Warrensburg, Missouri, was the last of six defendants to be sentenced in connection with a multi-million-dollar SIM-swapping conspiracy that claimed victims across the country, including in California, Missouri, Michigan, Utah, Texas, New York and Illinois. Endicott, along with 22-year-old Conor Freeman of Dublin, Ireland; Ricky Handschumacher, 28, of Pasco County, Florida; Colton Jurisic, 22, of…

Read More

Cybersecurity: Increase your protection by using the open-source tool YARA

Cybersecurity: Increase your protection by using the open-source tool YARA

This won’t replace antivirus software, but it can help you detect problems much more efficiently and allows more customization. Here’s how to install it on Mac, Windows and Linux. Image: djedzura/ iStock A plethora of different tools exist to detect threats to the corporate network. Some of these detections are based on network signatures, while some others are based on files or behavior on the endpoints or on the servers of the company. Most of…

Read More
1 3,159 3,160 3,161 3,162 3,163 3,816