The Cat and Mouse Game of Crypto Money Laundering
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
Despite the U.S. government adopting many recommendations by the Ransomware Task Force in combating ransomware, authorities...
Government officials cited progress a year after Biden's executive order, but stressed that "there's more work to do."
An 18-month malware campaign on a gambling company reveals how the Iron Tiger threat group has updated its toolkit.
Attackers exploited a previously-disclosed flaw in Fortinet VPN servers in order to hit European industrial firms with the Cring ransomware.
Apple said its App Tracking Transparency rules will restrict advertisers’ abilities to track user behavior, while still giving them the option to analyze the impact of their ads.
Attackers are targeting SAP enterprise applications that have not been updated to address previously-fixed flaws, researchers warn.
Senators pressure eight digital advertising exchanges - including Twitter, Google and AT&T - to disclose who is collecting what specific user data during the real-time bidding process.