Security Experts:

long dotted


A fifth suspect has been arrested over the recent TalkTalk hack. This time it’s an 18-year-old boy from Wales suspected of blackmail
Hilton Hotels said that hackers stole credit card information from some of its point-of-sale computer systems.
RSA researchers have analyzed GlassRAT, a stealthy piece of malware used in highly targeted attacks aimed at Chinese nationals in commercial organizations
European, US and Australian law enforcement officials met in the Netherlands to plan a crackdown on illegal online markets trading in everything from drugs to child pornography.
Pearson VUE says attackers used a piece of malware to access user data from its PCM certification management system
Man and woman suspected of operating and Cryptex Reborn malware services arrested by UK authorities.
Belgium announced that it will become a sponsoring nation for the NATO Cooperative Cyber Defence Centre of Excellence.
Encryption can be a terrorist's tool. But it's also a key for those hunting attackers, and for many others.
Starwood Hotels, which operates well-known hotel brands such as Westin, Sheraton, W Hotels and Le Méridien, said Friday that hackers had infected point of sale payment systems in some of its locations in North America.
Climate planning website of the World Bank breached by phishers and other hackers. Its EV certificate has been revoked as a result.


rss icon

Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Alastair Paterson's picture
Adversaries can exploit digital shadows to reveal weak points in an organization and launch targeted attacks, but some digital shadows can prove advantageous to your organization; the digital shadows of your attackers.
Jason Polancich's picture
Doxing can support much more sophisticated and impactful threats, much bigger targeting campaigns.
Scott Gainey's picture
Organizations are asking the question – how much do I really need to spend on security in order to tip the scales in my favor? In order to answer that question you must first quantify the impact and risk of a cyber attack.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Marc Solomon's picture
Cybercrime-as-a-Service is increasing the sophistication and frequency of attacks to the point where they seem to be pervasive. When evaluating your approach to security in light of this increasingly popular approach to attacks, seek out solutions that are equally pervasive.
Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.