The decision to move to the cloud may seem an obvious one. It’s faster, more scalable, and more agile. However,…
Browsing: Threat Intelligence
Many organizations are increasingly outsourcing software development and acquiring open source software products. In an effort to reduce costs for…
Attackers target default or easily-guessed usernames and passwords to breach enterprise defences; increasing complexity and attack surface expansion compounded by…
Erik Larsson, Vice President of Marketing at the Qosmos division of Enea, interviews Nicolas Bouthors, Chief Technical Officer, about the…
Smartphones, watches, televisions and fitness trackers could be used to hold people to ransom over personal data, cyber security experts…
Zero-day software vulnerabilities – security holes that developers haven’t fixed or aren’t aware of – can lurk undetected for years,…
Unit 42, Palo Alto Networks threat intelligence research arm, has recently observed attacks against multiple Middle Eastern government organizations using a…
Researchers have spotted a piece of malware that has somehow gotten hold of genuine Apple code-signing signature. Tim Helming, Director,…
Kaspersky Lab’s Global Research and Analysis Team has discovered a new sophisticated wiper malware, called StoneDrill. Just like another infamous…
DomainTools are announcing a partnership between themselves and Farsight security bringing both of their DNS-based cyber threat intelligence together so that…