Security Experts:

long dotted


Magento malware designed to swipe card data from infected websites hides stolen information in image files [Read More]
Canadian Foreign Minister Stephane Dion said he is "very concerned" about the possibility of Canada becoming the next target of Russian cyber attacks, and called for a "safe and free cyberspace." [Read More]
WikiLeaks has accused a "state party" of cutting the internet connection of its founder Julian Assange. [Read More]
US lawmakers want justice and intelligence officials to provide clarifications on the recent reports about Yahoo’s email surveillance program [Read More]
After its auction failed to generate any significant profit, Shadow Brokers has promised to release more NSA exploits if it raises 10,000 bitcoins [Read More]
Vice President Joe Biden said a "message" would be sent to Russian President Vladimir Putin over the alleged election-related hacks. [Read More]
Researchers from Cisco Talos have created "LockyDump", a new tool that allows users to extract the configuration of the Locky ransomware. [Read More]
Blockchain users taken to phishing site after attackers breached its registrar and changed DNS servers [Read More]
A newly observed ransomware family that was written in Python fetches a unique key for each of the victim’s files before encryption, Kaspersky researchers warn. [Read More]
Cyber attack attribution has long been a thorny problem. It is difficult to develop norms of international cyber behavior if attackers can hide behind plausible deniability. [Read More]


rss icon

Alastair Paterson's picture
Cyber situational awareness can provide insights into the people, processes and technology your adversaries use and turn those into an advantage.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.