Security Experts:

long dotted


Sophos researchers have tracked the evolution of SamSam through its three versions. It shows a developer getting evermore proficient in his craft. [Read More]
Check Point has uncovered a large Malvertising campaign that leverages thousands of compromised WordPress websites, involves multiple parties in the online advertising chain and distributes malicious content via multiple Exploit Kits. [Read More]
The PowerGhost crypto-miner is capable spreading across corporate networks and of stealthily infecting both workstations and servers. [Read More]
Researchers discovered two Pastebin posts that could provide more clues about the massive breach that resulted in the health records of 1.5 million Singaporeans getting stolen [Read More]
A multi-tier attack relied on compromising the shared infrastructure between a software supplying partner of an application vendor. [Read More]
A newly discovered remote access Trojan (RAT) dubbed Parasite HTTP includes a broad range of protections, including sandbox detection, anti-debugging, anti-emulation, and more, Proofpoint reports. [Read More]
Two Dutch men sentenced to 240 hours of community service for creating and using CoinVault, one of the first pieces of file-encrypting ransomware [Read More]
Symantec details Leafminer, a relatively new cyber espionage campaign linked to Iran. Attackers target governments and other organizations in the Middle East [Read More]
A series of recent attacks attributed to an Iran-linked cyber-espionage group delivered a PowerShell backdoor onto compromised machines, Palo Alto Networks has discovered. [Read More]
Ransomware hits Chinese shipping giant Cosco. The incident led to disruptions of the company’s website, phones and email systems in the U.S. [Read More]


rss icon

Siggi Stefnisson's picture
I think it’s largely understood that the rise of a virtual, anonymized and easy-to-use payment system was a key factor in making ransomware the phenomenon it is today.
Lance Cottrell's picture
The internet drives much of the world’s intelligence gathering, but its rapid evolution and lack of flexible policy-making is affecting how analysts do their jobs.
Markus Jakobsson's picture
While there are no signs today of criminals consolidating and reselling data from different breaches, it is an obvious concern as the value-add of the packaging would be substantial.
Josh Lefkowitz's picture
Retailers need relevant, actionable intelligence that can help them gain a decision advantage over the threats and adversaries they face year-round -- not just during the holiday shopping season.
Alastair Paterson's picture
The holiday season is in full swing and once again we can expect to see a surge in cyber attacks targeting retailers and consumers.
Siggi Stefnisson's picture
When disaster strikes, cyber criminals are always right behind, ready to apply social engineering techniques to take advantage of both the victims and people wishing to help.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.