MITRE’s latest project is a public library of detailed plans replicating tactics and techniques used by known attack groups. The first set of adversary emulation plans released this week describe the behavior of cybercrime group FIN6.
SWIFT and BAE Systems analyzed the web of businesses, money mules, and intermediate accounts used to transfer stolen money around the world until it becomes hard to trace.
Authorities in Ukraine arrested a suspect they say is Sanix, a hacker connected to the sale of the huge Collection 1 credential database.
The prolific Magecart group continues to evolve its attack techniques as it uses new skimmer code to steal payment card numbers from the websites of small- and medium-sized businesses, RiskIQ researchers found.
Security researchers, law enforcement, and analysts lurk in criminal marketplaces and forums collecting information which may indicate a possible data breach or data theft. It’s a tricky balancing act—blending in among criminals while not engaging in criminal activity that could get them arrested.