The Cat and Mouse Game of Crypto Money Laundering
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
Despite the U.S. government adopting many recommendations by the Ransomware Task Force in combating ransomware, authorities...
Government officials cited progress a year after Biden's executive order, but stressed that "there's more work to do."
After investigating the Deep Panda APT's recent exploitation attempts of the Log4j flaw, researchers uncovered a new kernel rootkit.
A widespread, international crackdown on business email compromise resulted in the arrest of 65 suspects.
Caitlin Condon, vulnerability research manager at Rapid7, talks about the rise of “widespread threats,” how the time to exploitation by attackers has shifted and what that means for security teams.
U.S. election officials and other state and local government officials received invoice-themed phishing emails aiming to steal their credentials, warned the FBI.
Attackers are using compromised Microsoft Exchange servers to launch thread-hijacking attacks that infect victims with the IcedID malware.