Security Experts:

long dotted


Researchers from Kaspersky Lab unveiled details on "The Mask", a sophisticated cyber-espionage campaign that the security firm is calling most advanced it has ever seen to-date.
Adding FireEye’s behavioral analysis technology will provide OpenDNS customers with real-time protection against custom malware, zero-day exploits and advanced persistent threats.
The leaking of classified NSA documents by Edward Snowden has resulted in defense contractors changing their companies' cybersecurity practices.
White Lodging Services, an independent hotel management company, said that its point of sales systems may have been breached and exposed customer payment data.
Kaspersky Lab said on Monday that it has been investigating a sophisticated cyber-espionage operation that it is calling “one of the most advanced threats at the moment”.
Researchers from RSA have discovered the server infrastructure behind a point-of-sale (PoS) attack campaign that has infected systems mostly in the United Sates, but also in 10 other countries including Russia, Canada and Australia.
Target Corporation said that the attacker(s) behind the recent massive data breach at the retailer likely compromised its systems by using stolen credentials from a vendor.
Researchers from Kaspersky Lab have uncovered a new malware that has the ability to infect systems running Windows, Mac OS X, and Linux and launch DDoS attacks from any infected devices.
Researchers from AVAST are warning users to beware of modified and malicious versions of the popular open source FileZilla FTP client that captures login details and sends them to a server hosted in Germany.
Hackers attacked Israeli computers including one used by the defense ministry department dealing with civilians in the occupied West Bank.


rss icon

Jeff Hudson's picture
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Wade Williamson's picture
By shortening the scope of an attack, it’s far less likely that response teams will get the chance to analyze such attacks in situ, so to speak.
Wade Williamson's picture
Security in the era of APTs is everyone’s problem, and to truly adapt means each team in an enterprise has to push itself out of its traditional comfort zone. Let’s look at some of these challenges.
Shaun Donaldson's picture
What is it about public cloud that breaks traditional endpoint security? First, let’s consider how traditional endpoint anti-malware ended-up where it is today.
Marc Solomon's picture
To detect, understand and stop advanced threats you need new tools and techniques that enable you to always watch, never forget and take action should a file be determined to be malicious at a later time. In effect, you need to be able to turn back time.
Marc Solomon's picture
Defenders need a new threat-centric approach to security to address the full attack continuum – before, during and after an attack – with continuous visibility into indicators of compromise and retrospective security to quickly contain and stop the damage.
Wade Williamson's picture
It’s important we remember that IT security is essentially an asymmetric struggle. If we don’t adapt, we simply play into the hands of those who want to attack us.
Marc Solomon's picture
In this continuously evolving threat landscape you need to ask yourself: Am I using the right criteria to determine how to better protect my organization from advanced attacks?
Chris Hinkley's picture
Without the internal and external safeguards working in conjunction, your vulnerability will spike and your performance will suffer as a by-product -- two things you can’t afford to have happen.
Wade Williamson's picture
Passwords are the ultimate goal for many hacking operations regardless of their sophistication. But, it’s important that we address the reality that strong passwords can’t be the only answer.