The Q1 Cybercrime Report from ThreatMetrix, published today, reveals that attackers are paying particular attention to the 'cross-border' transactions of payment processors.
Unfortunately there is a lack of knowledge and governance in many businesses around Kubernetes which in turn has created gaps in their security, but there are 3 key ways that organisations can keep their Kubernetes clusters secure.
A cyber-criminal managed to infiltrate the Mac app download site MacUpdate and install maliciously copies of the Firefox, OnyX, and Deeper applications that were in fact cryptocurrency miners.
A security researcher using the Twitter handle @noarfromspace last week spotted a fake Symantec blog spreading a new variant of the OSX.Proton password stealer.
A Russian hacker implanted a stealth cryptominer in his creations, including a mod of Grand Theft Auto (GTA) that was recently found on a Russian-speaking forum, available for download.
SC spoke to Adam Meyers, VP of intelligence at Crowdstrike at this year's InfoSec Europe 2017 about attribution and why it could be useful even for smaller businesses.
Economic hardship, availability of the dark web and the concentration of critical data in the workplace and have combined to create new opportunities for insiders.
The military conflict in Ukraine, and the accusations of Russian hackers targeting the Kremlin's political opponents in last November's US presidential election, have put cyber-security higher on the agenda of various countries in Eastern Europe. SC correspondent Jaroslaw Adamowski reports...
A legal framework for the US to respond to cyber-offensive operations is still hanging in Limbo as the Director of National Intelligence draws a blank on its status.
Investigative journalist Brian Krebs has published the findings of a massive investigation into the identity of Anna-Senpai, the mysterious publisher of the Mirai source code
A number of comments by French officials have highlighted fears that foreign interference may marr April and May's presidential elections.
ElasticSearch databases are now being ransacked and their contents ransomed back to their owners in an attack that looks very similar to MongoDB's recent assault
It's not that organised cybergangs are raking it in. It's more that a larger number of small operators are benefiting from automated services that can earn them an average of $2,000 (£1593) a month, according to a new report .
While cyber-criminals work together, businesses and law enforcement have a harder time doing so.
The Bank of Russia is to double the number of staff in its FinCERT unit, a special division set up to fight cyber-crime in the credit and financial sectors.
Passwords have been reset for a number of Gyft users as a precaution after account data was reported for sale.
Most corporate attacks apparently happen on a Friday, but just imagine how much of a threat is posed to retailers this coming weekend which is topped and tailed by Black Friday and Cyber Monday?
In this latest ransomware expect advances in how they are delivered and how they take instructions from the command-and-control server
Kate O'Flaherty reports how distributed denial of service attacks are growing in size and scale, making it important to know what to do before, during and after an attack
Technology can't replace the value of online safety education, the key to keeping kids out of predators' paths, panelists shared.
Kevin Bollaert, 28, operated the now-infamous revenge porn sites U Got Posted and Change My Reputation
Days after hacktivist collective Anonymous warned Israeli companies and websites that it would begin its annual cyber-attack campaign against the country on Tuesday, one Israeli political party's website was defaced.
Trend Micro believes that point-of-sale malware attackers will increasingly target travellers.