ThreatConnect reassesses what could happen next in light of recent public statements by Guccifer 2.0. We described the current state of…
Browsing: Strategy and Planning
A hacker known as Guccifer has stolen files from the Democratic National Committee and has revealed the top Democratic Donors,…
Toby Scott-Jackson, senior security consultant at SureCloud explores how penetration testing has changed – and how it must continue changing…
Today’s digital threats are more numerous and sophisticated than ever. As a result, many in the security industry feel organizations…
While researching the dangerous banking trojan, Lurk, Kaspersky Lab security experts have found that criminals behind this malware used legitimate software…
Researchers have found government malware on the Dark Web that could be used against energy grids. Black Energy was used…
As application development tools go, Node.js is already one of the fastest options available due to several key features, such…
Joanne Godfrey, Director of Corporate Communications & Strategy at AlgoSec, examines the conflicting views of security between IT teams and…
Scientists at the University of Florida (UF) say they have developed software that can stop the growing problem of ransomware in its…
In 2016 Nymaim malware resurfaced and is spreading via an intensive spearphising campaign utilizing malicious Microsoft Word attachments. Since the…