The Cat and Mouse Game of Crypto Money Laundering
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
Despite the U.S. government adopting many recommendations by the Ransomware Task Force in combating ransomware, authorities...
Government officials cited progress a year after Biden's executive order, but stressed that "there's more work to do."
The newly-proposed U.S. draft bill would introduce a license requirement for foreign companies to trade U.S. citizens’ personal information.
The U.S. federal agency advisory on the active exploits of five flaws comes in tandem with the U.S. government formally attributing the SolarWinds supply-chain attack to Russian Foreign Intelligence Service (SVR) actors.
The Lazarus threat group utilized a modified JavaScript sniffer to steal cryptocurrency from unsuspecting e-commerce website consumers.
Researchers found nine flaws that highlight the weaknesses of DNS protocol implementations in TCP/IP network communication stacks.
Up to 97 percent of organizations reported facing mobile threats that used multiple attack vectors during 2020, as cybercriminals continue to adopt new tactics to target mobile devices.