Security Experts:

long dotted


Apophis Squad hackers, one from the US and one from the UK who is already serving a prison sentence there, have been charged by US authorities. [Read More]
UK-based Identity Data Intelligence specialist GBG has agreed to acquire the Atlanta-based identity verification and fraud prevention services provider IDology for $300 million in cash. [Read More]
One of the many vulnerabilities patched by Microsoft with its February 2019 Patch Tuesday updates is an Internet Explorer zero-day which Google says has been exploited in attacks. [Read More]
Russian lawmakers on backed a bill that could cut off the country's internet traffic from servers abroad which critics say is a step towards censorship and possibly an isolated network like in North Korea. [Read More]
China's Ministry of Public Security (MPS) is now allowed to enter company premises, computer rooms and workplaces, and inspect all user information, computer infrastructure, cybersecurity protections, hosting or domain name information, and content distribution. [Read More]
United States senators have voiced concerns over the use of foreign-made Virtual Private Network (VPN) applications within the Department of Homeland Security. [Read More]
A recently observed coin miner targeting Linux machines can remove a broad range of other malware families from infected systems, Trend Micro’s security researchers reveal. [Read More]
When mysterious operatives lured two cybersecurity researchers to meetings at luxury hotels over the past two months, it was an apparent bid to discredit their research about an Israeli company that makes smartphone hacking technology. [Read More]
Chancellor Angela Merkel has inaugurated the new, fortress-like Berlin headquarters of Germany's scandal-plagued BND foreign intelligence service. [Read More]
NATO has opened its annual Defense Innovation Challenge and invites proposals on solutions to support NATO's command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and cyber capabilities. [Read More]


rss icon

Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Lance Cottrell's picture
Studying the DNC Hacker case shows just how difficult it is to maintain a false identity in the face of a highly resourced and motivated opponent.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Lance Cottrell's picture
Actively investigating and infiltrating criminal groups online is not “hacking back,” but it may provoke that as a response.
Alastair Paterson's picture
Malicious actors have been experimenting with a blockchain domain name system (DNS) as a way of hiding their malicious activity and bullet-proofing their offerings.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Laurence Pitt's picture
While awareness is key and technology is a great assistant, there is one simple practice we can all adopt: think before you click or share.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Alastair Paterson's picture
By closely following trends watching for new activities and actors across a variety of data sources, security professionals can continue to take steps to mitigate the digital risk to their enterprises, partners and customers.