Security Experts:

long dotted


New developments in machine learning (ML), artificial intelligence (AI), and cognitive computing (CC) can play an important role in cyber security. [Read More]
Chinese national Su Bin was sentenced on in Los Angeles to three years and 10 months in prison for hacking American defense contractors to steal trade secrets on Beijing's behalf. [Read More]
The Nymaim malware has reemerged strong on the threat landscape, marking a 63% increase in attacks compared to last year. [Read More]
Accounting for a quarter of all ransomware detections over the past 30 days, Cerber is strengthening its position at the top of the threat segment, data released by Microsoft this week reveals. [Read More]
The EU should take advantage of Britain's departure from the union to forge a common security policy, Germany's defense minister said. [Read More]
xDedic, a marketplace selling access to hacked servers, has reemerged as a Tor domain after a report exposed its illicit activity and encouraged its operators to take it down last month. [Read More]
SentinelOne says the dropper framework of the Furtim malware is a highly sophisticated and could be used to extract data or insert the malware to potentially shut down an energy grid. [Read More]
Patchwork is a new threat actor that has been targeting numerous entities around the world using code that has been copied from various online forums. [Read More]
In an attempt to miss the news cycle and fly below the radar, Omni Hotels disclosed that several of its PoS systems were infected by malware. A data breach notice was specifically set not to be indexed by search engines. [Read More]
Over the past month, thousands of websites built on the WordPress and Joomla! content management systems have been compromised to redirect users to the CryptXXX ransomware. [Read More]


rss icon

Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Alastair Paterson's picture
In 2015 we saw a surge in attacks against the financial services industry that involved extortion, social engineering, credential-stealing malware and sophisticated threats.
Wade Williamson's picture
Asking for security backdoors that only benefit the good guys is like asking for bullets that only hurt the bad guys. That’s simply not how encryption works.
Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.