Security Experts:

long dotted


European, US and Australian law enforcement officials met in the Netherlands to plan a crackdown on illegal online markets trading in everything from drugs to child pornography.
Pearson VUE says attackers used a piece of malware to access user data from its PCM certification management system
Man and woman suspected of operating and Cryptex Reborn malware services arrested by UK authorities.
Belgium announced that it will become a sponsoring nation for the NATO Cooperative Cyber Defence Centre of Excellence.
Encryption can be a terrorist's tool. But it's also a key for those hunting attackers, and for many others.
Starwood Hotels, which operates well-known hotel brands such as Westin, Sheraton, W Hotels and Le Méridien, said Friday that hackers had infected point of sale payment systems in some of its locations in North America.
Climate planning website of the World Bank breached by phishers and other hackers. Its EV certificate has been revoked as a result.
Tools and techniques used in attacks aimed at European firms suggest that the DarkSeoul group is back
Britain's GCHQ intelligence agency said it had spray-painted job adverts on London streets popular with hipsters to woo more employees with cyber skills.
Messaging app Telegram says it has blocked 78 accounts associated with the jihadist Islamic State group following the attacks in Paris.


rss icon

Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Alastair Paterson's picture
Adversaries can exploit digital shadows to reveal weak points in an organization and launch targeted attacks, but some digital shadows can prove advantageous to your organization; the digital shadows of your attackers.
Jason Polancich's picture
Doxing can support much more sophisticated and impactful threats, much bigger targeting campaigns.
Scott Gainey's picture
Organizations are asking the question – how much do I really need to spend on security in order to tip the scales in my favor? In order to answer that question you must first quantify the impact and risk of a cyber attack.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Marc Solomon's picture
Cybercrime-as-a-Service is increasing the sophistication and frequency of attacks to the point where they seem to be pervasive. When evaluating your approach to security in light of this increasingly popular approach to attacks, seek out solutions that are equally pervasive.
Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.