European police have arrested a "main target" as part of a previously undisclosed law enforcement effort, dubbed Operation Pleiades, against the distributed denial-of-service attack gang called DD4BC, or "DDoS for Bitcoin."
While DDoS attacks were once deemed primarily a nuisance, experts now say they're becoming a routine strategy cybercriminals use as part of a campaign to commit fraud or extortion. What are the four key attack trends to watch out for in 2016?
Slamming a Ukrainian energy provider for recently falling victim to a spear-phishing email and Excel macro attack might be easy. But security experts recommend all organizations use the incident to ensure they won't fall victim to copycat attacks.
As security leaders accept that breaches will happen despite perimeter defense and counter measures, incident response becomes an important evolution in an organization's security posture. Arbor's Jeff Buhl discusses the Asian stance and maturity.
In the wake of Juniper Networks finding "unauthorized code" in its firewall firmware that could be used to remotely access devices and encrypted communications, Cisco is reviewing its own code for signs of tampering. Will other vendors follow suit?
It's that time of the year. DSCI's Annual Security Summit and its Excellence Awards have arrived. Here are some of the exciting sessions and speakers that I will definitely be checking out at this year's event.
Amidst a perfect storm of circumstances, how will CISOs ensure that they remain relevant? Is outsourced security and MSSP dependence going to take over? Or are virtual CISO specialists going to rule the roost?
Three Greek banks are the latest DDoS shakedown targets of online attackers, who demanded a payment of 20,000 bitcoins ($7.2 million) to cease their attempted banking site disruptions. Security experts say such attacks are on the rise.
Key stakeholders representing international legal and security experts discuss strategies and frameworks to establish a cybersecure ecosystem and jurisprudence against growing threats and attacks. What is needed for them to succeed?
As U.S. merchants shore up physical point-of-sale security by upgrading their terminals to accept EMV chip cards, attackers are turning their aim toward new, unattended targets. Here's the latest on how to respond to "shimming" attacks.
Here's how police and intelligence officials in Europe and the United States are collaborating to identify and disrupt the network of people that planned, supported and launched the Nov. 13 terror attacks in Paris.
Distributed-denial-of-service attacks on banks are more powerful than ever, but we hear less about them than we did three years ago. How have attackers changed their tactics, and why should we be even more concerned about their strikes?