Security Experts:

long dotted


A newly observed Linux backdoor Trojan can perform its nefarious activities without root access, by using the privileges of the current user, Doctor Web security researchers have discovered. [Read More]
Twitter, GitHub and several other major websites are inaccessible for many users due to a DDoS attack on Dyn’s Managed DNS infrastructure [Read More]
US prosecutors are expected to file espionage charges against Harold Martin III who served as a private contractor for the National Security Agency. He is suspected of stealing an "astonishing quantity" of classified information. [Read More]
The Sarvdap spambot has been checking the IP addresses of infected hosts against common blacklists, in an attempt to ensure that its spam email is successfully delivered, Palo Alto Networks security researchers say. [Read More]
The Russian man arrested by Czech police in cooperation with the FBI is suspected of being involved in the 2012 LinkedIn hack [Read More]
Researchers believes the APT group variously known as Sofacy, APT28, Sednit, Fancy Bear and Tsar Team are behind attacks using an embedded OLE Word document containing embedded Flash exploits. [Read More]
Czech police said Wednesday they staged a joint operation with the FBI to arrest a Russian citizen in Prague suspected of staging cyber attacks on the United States. [Read More]
Ecuador said Tuesday it had cut the internet access of WikiLeaks founder Julian Assange, who is holed up at its London embassy, due to leaks by the anti-secrecy website that could impact the US election. [Read More]
Law enforcement agencies from 13 additional countries have signed up to the NoMoreRansom project since it started in July 2016. [Read More]
Chinese cyberspies have targeted the systems of a European drone maker and the U.S. subsidiary of a French energy management firm [Read More]


rss icon

Alastair Paterson's picture
Employees who have reused corporate emails and passwords for personal use can put their employers at risk of account takeovers, credential stuffing and extortion attempts.
Scott Simkin's picture
While exploit kits are certainly contributing to the steady rise in the number of cyberattacks, in the end, the methods they use to infect endpoints and networks can be stopped provided the proper steps are taken.
Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Alastair Paterson's picture
As recent events have shown, you shouldn’t let your guard down because a threat actor or operation appears to have been shut down.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.