July 5, 2017
Ralph Tkatchuk , Entrepreneur.com, June 30, 2017
The growing threat of cyber crime is having a massive impact on the way people do business on the internet. A Herjavec Group study shows cyber crime damages are expected to hit $6 trillion per year by 2021, which is double the amount from just a year ago.
Sheera Frenkel, Nytimes.com, July 2, 2017
The attack had the hallmarks of something researchers had dreaded for years: malicious software using artificial intelligence that could lead to a new digital arms race in which AI.-driven defenses battled A.I.-driven offenses while humans watched from the sidelines.
Dan Harris, Abcnews.go.com, June 29, 2017
Cybersecurity experts are rushing to analyze the new ransomware known by some as “Petya” that quickly spread to countries around the world Tuesday, including the United States, with hackers holding computers hostage for ransom payouts.
Lily Hay Newman, Wired.com, July 1, 2017
The first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren’t just your standard corporate breaches. It’s only July, and already there’s been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking.
Waqas Amir, Hackread.com, June 28, 2017
Armada Collective, a group of online attackers, is demanding a ransom payment of $315,000 from South Korean banks – In the case of refusal, the group has threatened the banks with a series of massive Distributed Denial of Service (DDoS) attacks.
Devesh Panchwagh, Deltarisk.com, June 29, 2017
Delta Risk has partnered with the Information Security Community on LinkedIn to examine the latest management trends, investment priorities, key challenges, and solutions preferences for incident response, threat hunting, threat detection, threat monitoring, insider threats, incident recovery, and more.
Lily Hay Newman, Wired.com, June 27, 2017
The latest sweeping ransomware assault bares some similarity to the WannaCry crisis that struck seven weeks ago. Both spread quickly, and both hit high-profile targets like large multinational companies and critical infrastructure providers.
Kelly Sheridan, Darkreading.com, June 28, 2017
When you think of a standard hacker toolkit, software vulnerabilities and malware come to mind. But a pair of researchers are testing a different type of instrument: a physical tool that can break into devices with a wave of your hand.
Help Net Security Staff, Helpnetsecurity.com, June 28, 2017
Cybercriminals have been shifting their tactics markedly, by registering more and more domain names, rather using web servers and domains they have hacked into. These “malicious domain registrations” accounted for half of all the domain names used for phishing in 2016, according to APWG.