Tom Neaves of Trustwave discusses how the increased awareness about cyber security at the board level is a step in the right direction.
Browsing: Threat Intelligence
According to Kaspersky Lab, the number of untrusted digital certificates used to sign malicious software doubled in the last year.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).
The Cybereason Research Lab found that commonly used traditional Microsoft monitoring tools miss common attacker behavior such as privilege escalation.
Ilia Kolochenko of High-Tech Bridge weighs in on the growing threat of ransomweb attacking businesses’ website server.
Websense Security Labs discusses how Nuclear Pack, one of the most popular exploit kits, has evolved.
Professor John Walker comments on a recent security incident in which the Nottinghamshire Police web site was defaced by AnonGhost.
AlienVault has created an infographic explaining the facts and statistics about cybercrime with respect to credit cards and debit cards.
Group-IB and Fox-IT, in a joint investigation effort, recently released a report about the Anunak hacker group.
Trustwave researchers analyze ‘Spark,’ a variant of the Alina point-of-sale malware that has not been widely reported on.