Portcullis regularly gets contacted by organisations seeking help with regards to cyber attacks.
Browsing: Malware and Vulnerabilities
The primary approaches used to fight cybercrime over the past several years simply aren’t effective.
FireEye security experts discovered a new series of cyber attacks conducted by Chinese hackers targeted the US media in 2012, the attackers have improved the malware used in previous campaign against the New York Times.
When Lavabit — an email service that National Security Agency leaker Edward Snowden used — suspended service last week amid hints that it had received a government demand for information
In-browser security specialist Trusteer has published a white paper – Stepping Up the Battle Against Advanced Threats – and which says the endpoint has become the path of least resistance for cybercriminals
The Snowden incident where, according to the New York Times (21Jun2013), a government intelligence worker was able to easily copy and disseminate large amounts of highly sensitive and classified data
DOSarrest Internet Security announced today that it will begin offering a website Vulnerability Testing and Optimization (VTO) service.
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed. Microsoft will stop releasing security updates for the OS on that date.
The Central Tibetan Administration website has been hacked to serve up a Java exploit that drops advanced malware, marking the latest attempt to compromise people hoping for freedom from Chinese control in the province.
Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that it has joined the Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) as a sponsoring member.