Security Experts:

long dotted


Packing various anti-analysis and anti-reversing capabilities, Nerbian RAT is being distributed via emails carrying COVID-19 and World Health Organization themes. [Read More]
Costa Rica has declared a state of emergency after a ransomware attack disrupted several government systems. [Read More]
Texas startup Balkan ID banks $5.75 million in seed funding to help organizations find and remediate risky privileges across SaaS and public cloud infrastructure. [Read More]
The use of ransomware and the targeting of entities outside typical victimology suggest the Iranian APT Charming Kitten might switch to financially-motivated activities. [Read More]
Over the last 24 hours, two Silicon Valley startups jostling for space in the corporate email security market raised venture capital funding at a combined valuation of $5.1 billion. [Read More]
Researchers have analyzed the potential risks associated with vanity URLs for popular SaaS applications such as Box, Zoom and Google Docs. [Read More]
Ransomware attack and Covid-19 are blamed for the closure of Abraham Lincoln's namesake college after 157 years. [Read More]
Omnicell noted in a Form 10-Q filing with the US SEC that the incident impacted internal systems and products and services. [Read More]
Cyber experts are urging Africa to up its game in the face of criminals targeting the continent's fast-growing internet economy with scams and theft. [Read More]
The critical F5 BIG-IP vulnerability CVE-2022-1388 is being exploited to erase files from appliances, potentially causing serious disruption. [Read More]


rss icon

Derek Manky's picture
Botnets are becoming more malicious, sometimes able to create hundreds of thousands of drones that can attack a variety of machines, including Mac systems, Linux, Windows systems, edge devices, IoT devices, and so on.
Idan Aharoni's picture
Despite having different infrastructure, goals and methods, threat actors do not work in a vacuum. They feed off of each other.
Derek Manky's picture
How can organizations fight ransomware? The best solution is always prevention. Here are three tactics toward that goal.
Joshua Goldfarb's picture
The question of the importance of the state of a client device is a debate that has been around for a few years in the security field.
Idan Aharoni's picture
Plausible deniability provides a massive operational leeway to military operations in cyberspace, enabling governments to take actions without risking an all-out war.
Keith Ibarguen's picture
Leveraging humans for detection makes it hard for the attackers to predict whether or not their malicious emails will be identified and using technology to automate response provides scale and speed in resolution.
Idan Aharoni's picture
The fact that so many large and high-profile enterprises fall prey to ransomware attacks that in many cases does not pose any new technical challenge suggests that there are still many gaps that needs to be closed.
Derek Manky's picture
We tend to focus on the attack surface when it comes to cybersecurity, but the reality is, much like an iceberg, there’s so much more lurking beneath the surface.
Gordon Lawson's picture
Threat hunting must be non-attributable, while maintaining a clear audit trail to satisfy legal and governance requirements.
Idan Aharoni's picture
Fraudsters will determine who to target within the industry based on each service’s fraud prevention policies and maturity, rather than generally targeting the industry.