Security Experts:

long dotted


Neptune exploit kit, also known as Terror, Blaze and Eris, used to deliver Monero miner via malvertising campaign [Read More]
OurMine hackers take control of PlayStation Facebook and Twitter accounts, and claim to have obtained PlayStation Network databases [Read More]
Elon Musk and over 100 robotics and AI entrepreneurs demand global ban on killer robots [Read More]
A piece of code linked to both the UK researcher Marcus Hutchins (aka MalwareTech) and the Kronos malware was first published in 2009 [Read More]
Russia-linked Turla cyberspies use new dropper to deliver JavaScript backdoor in attacks aimed at entities interested in G20 [Read More]
A Canadian man accused of carrying out devastating cyberattacks on Yahoo waived his right to an extradition hearing on Friday and will soon be handed over to US marshals. [Read More]
President Donald Trump ordered the US military on to elevate its cyber warfare operations to a separate command, signaling a new strategic emphasis on electronic and online offensive and defensive operations. [Read More]
Described as 'The Next WannaCry Vulnerability', all that is currently missing is full disclosure of the vulnerability (CVE-2017-8620) and a usable exploit. [Read More]
China's first "cyber court" was launched Aug. 18 to settle online disputes, as the legal system attempts to keep up with the explosion of mobile payment and e-commerce. [Read More]
A ransomware called SyncCrypt hides its components inside online harmless-looking images that don’t trigger anti-virus detection. [Read More]


rss icon

Alastair Paterson's picture
The emergence of decentralized marketplaces within the criminal ecosystem poses significant challenges for law enforcement agencies and private security vendors.
Jack Danahy's picture
Awareness is not enough. Companies also need to dedicate themselves to protecting users and eliminating the blind spots caused by unpatched systems and a lack of strong endpoint protection.
Alastair Paterson's picture
As the opportunity for payment card fraud grows, it’s safe to assume that more cybercriminals will take advantage of new, sophisticated online courses to get a piece of the pie.
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
While President Trump’s executive order has laid an impressive and hopeful foundation for a more secure nation, its focus on bolstering federal defenses against large-scale cyber attacks and nation-state cyber threats is still too narrow.
Alastair Paterson's picture
There’s a great deal of intelligence organizations can find on the deep and dark web, but it's important to remember that criminal activity isn’t limited to the dark web.
Josh Lefkowitz's picture
Most threat intel teams haven’t been conditioned to maintain a comprehensive understanding of how geopolitical factors can influence, emergent strains of malware, insider threats, or supply chain security vulnerabilities.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.