Cybercrime

2020 Payment Security Report

In this report, we distill a range of Payment Security and compliance subjects into valuable insights to help CISOs and others break down complex thinking into digestible bits. We explore various tools, tactics and methods applied by numerous organizations and take a look at why some companies accomplish so much more than others in their

2020 Payment Security Report Read More »

The changing face of cybercrime

January to June 2020 has seen societal change on a global level, as COVID-19 continues to impact the global digital economy, regional economies, industries, businesses and consumer behavior. This includes an increase in cybercrime. Online transaction volumes in the LexisNexis® Digital Identity Network® continue to grow, particularly across online retailers and digital banking services. However,

The changing face of cybercrime Read More »

The Hacker Infrastructure and Underground Hosting: Services Used by Criminals

Trend Micro has released research that states organizations’ on-premise and cloud-based servers are compromised, abused and rented out as part of a sophisticated criminal monetization lifecycle. To understand how the criminal underground operates, one need to understand not only the criminals, their motivations, and their business models, but also the infrastructure and services that underpin

The Hacker Infrastructure and Underground Hosting: Services Used by Criminals Read More »

The Cybersecurity Landscape: Challenges and How to Overcome Them

The Current State of Cybersecurity Companies must protect their own and their customers’ most private and essential information from cybercriminals, and it’s a 24/7 job that requires constant preparedness and instant response. With attacks coming from many different types of attack vectors across many different attack surfaces, cybersecurity is an ever-evolving priority for executives in

The Cybersecurity Landscape: Challenges and How to Overcome Them Read More »

An Insider View into the Increasingly Complex Kingminer Botnet

Sophos has released new research about the use of servers in carrying out attacks; “An Insider View into the Increasingly Complex Kingminer Botnet”. The Kingminer botnet attempts to gain server access by brute-forcing login credentials, and Sophos now finds that it’s using the infamous EternalBlue exploit in an attempt to spread malware among other attack

An Insider View into the Increasingly Complex Kingminer Botnet Read More »

Summary of Tradecraft Trends for 2019-20: Tactics, Techniques and Procedures Used to Target Australian Networks

 Overview The Australian Cyber Security Centre (ACSC) investigated and responded to numerous cyber security incidents during 2019 and 2020 so far. This advisory provides a summary of notable tactics, techniques and procedures (TTPs) exploited by Advanced Persistent Threats (APT) and cybercriminals identified during the ACSC’s investigations. These TTPs are summarised practically in the framework of

Summary of Tradecraft Trends for 2019-20: Tactics, Techniques and Procedures Used to Target Australian Networks Read More »