Twitter Locks Some Accounts After 32 Million Passwords Leaked

Following the news that Twitter locks some accounts after 32 million passwords leaked, security experts from InfoArmor and Lastline commented below.  Andrew Komarov, Chief Intelligence Officer at InfoArmor: All this data is from third party sources and botnets, and in 80% – it is fake, or generated, and that’s why we suggest that people be calm  when faced with […]

Hours before Euro 2016, Fake Websites Are Still Offering Overpriced Tickets

As demand exceeds supply, ESET finds online scammers are trying to take advantage of fans desperately scouring the web for the last few tickets. Using newly created fake websites, they are offering overpriced tickets that they may not even possess. The competition to find the best national football team in Europe starts in just a […]

Wendy’s POS Breach Larger Than First Reported

Following the news that Wendy’s POS breach larger than first reported, Péter Gyöngyösi, Blindspotter Product Manager, Balabit commented on this news below. Gyöngyösi, Blindspotter Product Manager at Balabit: “The slow but steady transition underway in the US that would eventually replace classic magstripe cards with chip-and-pin ones will certainly reduce the breadth of such attacks, as […]

FireEye Releases First Mandiant M-Trends EMEA Report

EMEA organizations not up to the challenge of stopping advanced threats; dwell time three times longer than global average FireEye, Inc. (NASDAQ: FEYE), the leader at stopping today’s advanced cyber attacks, today announced the release of the first Mandiant® M-Trends® EMEA report. M-Trends EMEA drills down into the statistics collected during investigations conducted in EMEA by Mandiant’s […]

Self-Driving Cars Have A Privacy Problem

Where the self-driving cars provide lots of facilities at the same time they may be the troublesome innovation to travel that we have experienced in a century. The biggest, particular concern with regard to self-driving cars is data privacy and cyber security risks. Pat Clawson, Blancco technology Group CEO commented below on the need for new […]

Malicious Documents Leveraging New Anti-VM & Anti-Sandbox Techniques

Introduction: Zscaler ThreatLabZ recently came across a new wave of malicious documents evading automated analysis systems using a new technique. Malicious executables that leverage numerous techniques to detect the virtual environment and automated analysis systems are very common, but we are seeing an increasing trend of such techniques moving to the initial delivery vector (i.e. weaponized […]

Making Business Sense Out Of Internet Of Things (IoT) Data

 The potential benefit IoT can bring to an economy is growing at a rapid pace: recent figures show big data and IoT together are expected to generate £322 billion in revenue for the UK economy from 2015 to 2020 alone. Analyst firm Gartner has also recently highlighted the top IoT technologies that should be on every organisation’s radar through […]

Infocyte HUNT Delivers First Agentless Threat Hunting Solution for Linux Platforms

Endpoint hunting identifies active and dormant malware missed by security monitoring, drastically reducing the breach detection gap and strengthening defense-in-depth strategies Infocyte, a provider of agentless hunt technology that eradicates malware and persistent threats, today released Infocyte HUNT™ v2.0 (formerly called Infocyte Pulse). The agentless threat hunting platform now features the ability to scan Linux endpoints in […]

Hacker Selling Twitter Accounts

Following the news  that the Russian seller, who goes by the name Tessa88, claimed in an encrypted chat on Tuesday to have obtained Twitter’s database, which includes email addresses, usernames and plain-text passwords, there below the comments from different security experts. Tod Beardsley, Security Research Manager at Rapid7:  “While the credentials themselves appear to be real, the details provided […]