Security Experts:

long dotted


The adultery website Ashley Madison said Monday that customers' data had been stolen by hackers and user information was briefly posted online before the breach was fixed.
Hackers might have stolen the personal and medical records of 4.5 million individuals after gaining access to the networks of UCLA Health.
CVS, Costco, Walmart Canada, Tesco and others suspend online photo centers while their service provider investigates possible credit card breach.
A South Korean intelligence official has been found dead in an apparent suicide amid a growing political scandal over a covert hacking program used by the country's spy agency, police said Sunday.
New GamaPoS malware steals payment card data from US organizations. The threat is delivered using the Andromeda botnet.
The criminal gang behind the Dyre malware will target more Spanish banks and Spain-based subsidiaries of other banks this summer with fraudulent wire transfers, according to IBM security researchers.
Darkode was taken down this week in an operation by 20 countries including the United States and such far flung nations as Australia and Cyprus.
Epic Games forum hacked. Attackers may have gained access to usernames, email addresses, passwords and other data.
A man suspected of belonging to a network of Islamist hackers responsible for attacks on more than 3,500 websites worldwide was arrested in Bulgaria.
CloudFlare received more than 65 governmental requests in the first half of 2015, much more than in the previous period.


rss icon

Scott Gainey's picture
Organizations are asking the question – how much do I really need to spend on security in order to tip the scales in my favor? In order to answer that question you must first quantify the impact and risk of a cyber attack.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Marc Solomon's picture
Cybercrime-as-a-Service is increasing the sophistication and frequency of attacks to the point where they seem to be pervasive. When evaluating your approach to security in light of this increasingly popular approach to attacks, seek out solutions that are equally pervasive.
Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.