The Justice Department Took Down the 911 S5 Botnet

The US Justice Department has dismantled an enormous botnet: According to an indictment unsealed on May 24, from 2014 through July 2022, Wang and others are alleged to have created and disseminated ...
FTC: Half of Fraud Involves Impersonation

FTC: Half of Fraud Involves Impersonation

According to data released by the FTC in its annual Consumer Sentinel Network Data Book, nearly half of the fraud reported to the federal government in 2023 fell into the category of ...

Operation Endgame | Botnets disrupted after international action

On Thursday, May 30th, 2024, a coalition of international law enforcement agencies announced "Operation Endgame". This effort targeted multiple botnets, such as IcedID, Smokeloader, SystemBC, Pikabot, and Bumblebee, as well as their ...

Ukrainian REvil Hacker Gets 13-Year Sentence Plus $16M Fine

In a significant victory against cybercrime, the Ukrainian REvil hacker has been sentenced to over 13 years in prison and ordered to pay a hefty fine of $16 million for orchestrating thousands ...
3 Ways File Integrity Monitoring Identifies Zero-Day Attacks

3 Ways File Integrity Monitoring Identifies Zero-Day Attacks

A zero-day attack leaves your software vulnerable to being exploited by hackers. It is a serious security risk. Cybercriminals are becoming more and more adept at breaching IT security systems.  ...
How to Protect Against Evolving Cyberattacks

How to Protect Against Evolving Cyberattacks

The industry produces new tools, techniques, and frameworks to protect against cyberattacks every year. Organizations have raised their cybersecurity budgets practically every year for the last two decades. Still, the number of ...
Arkose Accelerate – April 2024

Chatting with Theresa Payton: A Closer Look at Cybersecurity and Digital Innovation

Hey all! I want to share some highlights from a truly engaging talk at the latest Arkose Accelerate with Theresa Payton, former White House CIO and a noted cybersecurity expert. Theresa recently ...
Cybercrime Predictions from an Industry Veteran: Tom Cornelius

Cybercrime Predictions from an Industry Veteran: Tom Cornelius

The cyber threat landscape is ever-evolving, with criminals employing increasingly sophisticated tactics to infiltrate and exploit businesses. But what if the very people tasked with protecting organizations against these threats are engaging ...
The Evolving Triad of Cyber Threats: BEC, Ransomware, and Supply Chain Attacks

The Evolving Triad of Cyber Threats: BEC, Ransomware, and Supply Chain Attacks

Historically, cybercriminals have been happy to stick with proven tactics for as long as possible. After all, it's a business to them—if it ain't broke, why fix it? However, this is not ...
The Change Healthcare Cyberattack

The Change Healthcare Cyberattack

In a recent podcast interview with Cybercrime Magazine's Host, Heather Engel, Scott Schober, Cyber Expert, Author, and CEO of Berkeley Varitronics Systems, discusses the cyberattack that recently hit Change Healthcare. The podcast ...