News broke today that newly discovered first-stage implant targeting Korean-speaking victims borrows code from another reconnaissance tool linked to Comment Crew,…
Browsing: Threat Intelligence
In response to the recent discovery of GreyEnergy, a highly sophisticated piece of malware targeted industrial control systems, please see…
Despite 59% of cybersecurity professionals saying the widening workforce gap puts their organizations at risk, a majority of workers report…
In response to the report from NCSC which says that the UK has faced ten cyberattacks per week for the…
According to the recent report from the cybersecurity authorities of the “Five Eyes”, the availability of hacking tools and techniques are not…
It has been reported that the UK government has launched a voluntary Code of Practice to help secure internet-connected IoT devices. Gavin Millard,…
Companies have invested in protection technologies for decades – firewalls, web and email security gateways and endpoint protection. Over time,…
According to the US-CERT, tools and techniques for exploiting networks and the data they hold are by no means the preserve of…
An email phishing attack struck Iceland sending out malicious emails to thousands of individuals, in an attempt to fool them into installing…
Payments organisations and banks held their first-ever joint cyber-security war game in a bid to test their systems amid rising…