Security Experts:

long dotted


Czech police said Wednesday they staged a joint operation with the FBI to arrest a Russian citizen in Prague suspected of staging cyber attacks on the United States. [Read More]
Ecuador said Tuesday it had cut the internet access of WikiLeaks founder Julian Assange, who is holed up at its London embassy, due to leaks by the anti-secrecy website that could impact the US election. [Read More]
Law enforcement agencies from 13 additional countries have signed up to the NoMoreRansom project since it started in July 2016. [Read More]
Chinese cyberspies have targeted the systems of a European drone maker and the U.S. subsidiary of a French energy management firm [Read More]
Magento malware designed to swipe card data from infected websites hides stolen information in image files [Read More]
Canadian Foreign Minister Stephane Dion said he is "very concerned" about the possibility of Canada becoming the next target of Russian cyber attacks, and called for a "safe and free cyberspace." [Read More]
WikiLeaks has accused a "state party" of cutting the internet connection of its founder Julian Assange. [Read More]
US lawmakers want justice and intelligence officials to provide clarifications on the recent reports about Yahoo’s email surveillance program [Read More]
After its auction failed to generate any significant profit, Shadow Brokers has promised to release more NSA exploits if it raises 10,000 bitcoins [Read More]
Vice President Joe Biden said a "message" would be sent to Russian President Vladimir Putin over the alleged election-related hacks. [Read More]


rss icon

Alastair Paterson's picture
Employees who have reused corporate emails and passwords for personal use can put their employers at risk of account takeovers, credential stuffing and extortion attempts.
Scott Simkin's picture
While exploit kits are certainly contributing to the steady rise in the number of cyberattacks, in the end, the methods they use to infect endpoints and networks can be stopped provided the proper steps are taken.
Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Alastair Paterson's picture
As recent events have shown, you shouldn’t let your guard down because a threat actor or operation appears to have been shut down.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.