“There are only two kinds of companies. Those that were hacked and those that don’t yet know they were hacked.”…
Browsing: Cybercrime
Many companies feel overwhelmed with the burden of covering all aspects of IT security, since growing network structures and factors…
A new report from Intel Security reveals the latest persuasion techniques leveraged by cybercriminals to manipulate employees.
Kaspersky Lab, INTERPOL, Europol and authorities from different countries have combined efforts to uncover the criminal plot behind an unprecedented…
Cytegic wonders why state-sponsored hackers from China would target and infiltrate Anthem.
Cytegic discusses how we need to reevaluate how we analyze and act on cyber threat intelligence.
Experts in the information security industry comment on the recent data breach at Anthem, America’s second largest health insurer.
Tom Neaves of Trustwave discusses how the increased awareness about cyber security at the board level is a step in the right direction.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).
Cytegic discusses the militarization of discourse that revolves around securing cyberspace.