Cybercrime , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime

Nation-State and Cybercrime Gangs: Lines Blur

CrowdStrike's Zeki Turedi Discusses Pseudo-Ransomware, False Flags, Leaked Toolkits
Zeki Turedi, technology strategist for EMEA, CrowdStrike

In the past 12 months, there's been a blistering series of high-impact attacks, including a marked increase in pseudo-ransomware attacks and supply chain subterfuge. "It's been a very interesting year from a cyber perspective," says Zeki Turedi of CrowdStrike, who highlights "the blurred lines between statecraft and criminal organizations."

See Also: Webinar | The Future of Adaptive Authentication in Financial Services

But how much of this blurring is intentional, and how much of it is incidental?

In a video interview at the recent Infosecurity Europe conference in London, Turedi discusses:

  • Nation-state attacks;
  • False flag operations;
  • How cybercrime gangs have been grabbing leaked nation-state toolkits;
  • Supply chain risks.

Turedi is the technology strategist for Europe, the Middle East and Africa at CrowdStrike. He has extensive incident response and forensic experience within law enforcement, government and the private sector. His specialties include incident response, malware analysis, threat intelligence, digital forensics, network forensics, digital investigations, data loss prevention and advanced threat modeling.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.