A burst of global law enforcement actions during the past few weeks marked by a flurry of successful takedowns gives cybercrime experts a jolt of hope.
Wild variances in naming taxonomies aren’t going away, but a new initiative from the security vendors aims to more publicly address obvious overlap in threat group attribution.
The yearslong scheme goes much deeper than contract work, extending to roles beyond traditional IT and sometimes granting the insider threat “keys to the kingdom,” DTEX President…
Ransomware groups last year achieved lateral movement within an average of 48 minutes after gaining initial access to targeted environments, threat intelligence experts said.
A Ukrainian serviceman walks in a snow-covered trench on the front line with Russia-backed separatists near Avdiivka in the Donetsk region on Feb. 3, 2022 (Photo by ANATOLII STEPANOV/AFP via Getty Images)
Amid questions about the most recent cyberattacks on Ukraine a known adversary has been observed launching its own attacks.
Feb 4, 2022
Two “SilverTerrier” suspects, center, appear in an unidentified location with law enforcement officers who participated in Operation Falcon II.(Interpol)