Researchers discovered a link between four malware families — Ursnif, Emotet, Dridex and BitPaymer — that suggests threat actors may be combining efforts to develop more sophisticated attack vectors.
Cybercriminals often leverage time-tested methods of money laundering to stay undetected and move stolen funds across secret accounts.
Criminals may use synthetic identities to execute buy-and-ship fraud schemes, purchasing cars with false details with no intent of paying.
A culture of economic espionage may thrive in places where corruption and organized crime reigns supreme. What should companies know about this threat?
Knowing money mules work for organizations to transfer illegally acquired money. The following are a few different ways these mules tend to operate.
Organized crime and terrorist groups are converging, raising the stakes for transnational crime rings and opportunities for damaging cyberattacks.
In the wake of a reported data breach by hackers in Russia, individuals and companies should be on the lookout for these types of malicious attacks.