For every problem, there is a solution. In the world of cyber security, however, if each and every problem is…
Browsing: Threat Intelligence
Last November Unit 42, Palo Alto Networks threat intelligence research arm, reported on Shamoon attacks in Saudi Arabia. It is…
I have been listening to, and reading the debate relating to the safety of children when they are on-line, and…
Several States across the nation are reviewing Cyber Security for Critical Infrastructure after the Burlington Electric Department found a laptop…
Data Will Continue to Be Weaponized in New and Inventive Ways Between the ransomware attacks that plagued the healthcare industry…
What is a faketivist? Faketivist /fāktəvəst/ Noun A fictitious persona created to emulate a hacktivist and act as a public-facing…
Robbers stole the equivalent of £28,000 – but it could have been far worse London (UK). Following an extensive investigation,…
Evolving threat landscape reveals a growing need for security intelligence In 2016, the world’s biggest cyber-threats were related to money,…
Threat research for November 2016 reveals both Locky and Cryptowall attacks increased by 10% over the past month UK. Check Point has revealed that…
Following the news that patients are being put at risk because most NHS trusts are still using old Windows XP…