Two security experts comment on the recent news that a new CTB Locker ransomware variant is targeting users’ data.
Browsing: Threat Intelligence
Jack Marsal of ForeScout Technologies discusses how network access control (NAC) can help companies better protect against breaches and other attacks.
Tom Neaves of Trustwave discusses how the increased awareness about cyber security at the board level is a step in the right direction.
According to Kaspersky Lab, the number of untrusted digital certificates used to sign malicious software doubled in the last year.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).
The Cybereason Research Lab found that commonly used traditional Microsoft monitoring tools miss common attacker behavior such as privilege escalation.
Ilia Kolochenko of High-Tech Bridge weighs in on the growing threat of ransomweb attacking businesses’ website server.
Websense Security Labs discusses how Nuclear Pack, one of the most popular exploit kits, has evolved.
Professor John Walker comments on a recent security incident in which the Nottinghamshire Police web site was defaced by AnonGhost.
AlienVault has created an infographic explaining the facts and statistics about cybercrime with respect to credit cards and debit cards.