Garrett Gross of AlienVault discusses how it is important to think carefully when considering whether or not to allow the use of Tor on your network.
Browsing: Threat Intelligence
Two security experts comment on the recent news that a new CTB Locker ransomware variant is targeting users’ data.
Jack Marsal of ForeScout Technologies discusses how network access control (NAC) can help companies better protect against breaches and other attacks.
Tom Neaves of Trustwave discusses how the increased awareness about cyber security at the board level is a step in the right direction.
According to Kaspersky Lab, the number of untrusted digital certificates used to sign malicious software doubled in the last year.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).
The Cybereason Research Lab found that commonly used traditional Microsoft monitoring tools miss common attacker behavior such as privilege escalation.
Ilia Kolochenko of High-Tech Bridge weighs in on the growing threat of ransomweb attacking businesses’ website server.
Websense Security Labs discusses how Nuclear Pack, one of the most popular exploit kits, has evolved.
Professor John Walker comments on a recent security incident in which the Nottinghamshire Police web site was defaced by AnonGhost.