Security Experts:

long dotted


NASA has denied a hacker group’s claims that it obtained sensitive information from the agency’s systems and that it hacked one of its drones [Read More]
Cybercriminals behind the Dridex botnet have ramped up their email campaign activity following a short holiday season break, researchers at FireEye Labs say. [Read More]
Luxury retailer Neiman Marcus informed 5,200 customers last week that their online accounts had been accessed by hackers [Read More]
Encrypted communication is making law enforcement and counterterrorism investigations more difficult, but fears of "going dark" are overblown, a study shows. [Read More]
Researchers at Kaspersky Lab have discovered a Linux backdoor that has been migrated to Windows and added a series of new capabilities. [Read More]
The Fraternal Order of Police (FOP) was hacked and terabytes of files were reportedly stolen [Read More]
Israel represents only 0.1 percent of the world's population but roughly 20 percent of global investments in cyber security. [Read More]
A hacker accused of offering support to the Islamic State of Iraq and the Levant (ISIL), appeared in court in the U.S. on Wednesday, after being arrested in Malaysia in October 2015. [Read More]
HSBC said it had successfully repelled a DDoS attack on Jan. 29, although online access to banking services was disrupted. [Read More]
US and British intelligence agencies for years hacked into Israeli drones carrying out surveillance to prepare for a potential strike on Iran, according to reports. [Read More]


rss icon

Jason Polancich's picture
cybercrime is beginning to really impact the lives of individuals and businesses in increasingly harmful ways. In fact, the illicit market that is the Dark Web now trades in all manner of cybercrime exploits that can do harm.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.
Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Alastair Paterson's picture
Adversaries can exploit digital shadows to reveal weak points in an organization and launch targeted attacks, but some digital shadows can prove advantageous to your organization; the digital shadows of your attackers.
Jason Polancich's picture
Doxing can support much more sophisticated and impactful threats, much bigger targeting campaigns.
Scott Gainey's picture
Organizations are asking the question – how much do I really need to spend on security in order to tip the scales in my favor? In order to answer that question you must first quantify the impact and risk of a cyber attack.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Marc Solomon's picture
Cybercrime-as-a-Service is increasing the sophistication and frequency of attacks to the point where they seem to be pervasive. When evaluating your approach to security in light of this increasingly popular approach to attacks, seek out solutions that are equally pervasive.
Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.