Security Experts:

long dotted


Cyberattacks targeting the World Anti-Doping Agency (WADA) have been linked by experts to the Russian threat actor known as Fancy Bear, APT28 and Pawn Storm [Read More]
A gang of foreign criminals stole millions of baht by hacking a Thai bank's ATM network in a theft believed linked to a similar one in Taiwan, police said. [Read More]
Hackers with apparent ties to Russia have conducted a series of cyber attacks on US media outlets including the New York Times, CNN reported Tuesday. [Read More]
Police in 28 European countries arrested 75 suspects for sharing child sex images on the internet while investigating 207 cases across the continent, Europol said. [Read More]
If the purpose of a legal definition of cyber warfare is to facilitate a predefined, formal response, there is still the problem of attribution. Who did it? [Read More]
Juniper Networks has analyzed the implants leaked by Shadow Brokers, but there is no evidence that they exploit a vulnerability in ScreenOS [Read More]
A new ransomware family was recently observed being distributed under two different variants, including one that takes screenshots of a victims’ computer and sends them to the operator’s servers. [Read More]
A newly observed Linux Trojan is capable of self-spreading through infected websites and can recruit the infected machines into a peer-to-peer (P2P) botnet, Doctor Web researchers warn. [Read More]
The Gozi, Trojan is using highly elaborated webinjects along with behavioral biometrics for fraud protection bypass in new campaigns targeting global brands. [Read More]
Twitter has suspended 360,000 accounts for violating its policies related to promotion of terrorism, of which 235,000 accounts were suspended in the past six months. [Read More]


rss icon

Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.