It seems today, it’s no longer a question of if you will be breached, but when. Despite the best efforts…
Browsing: Threat Intelligence
Proofpoint researchers noticed a variety of election-themed emails during June and July- everything from straightforward text-based spam with embedded links…
Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.…
Following Symantec’s discovery of Strider, a previously unknown cyberesionage group, security experts commented below. Leo Taddeo, Chief Security Officer at Cryptzone:…
Following the investigation into the attempted hack into the Garda Síochána (Irish Police) computer system, Jonathan reminds organisations of the…
There’s a sucker born every minute. And for each sucker there are hundreds of scammers waiting to take advantage of…
So it might not be immediately apparent but when I am not hacking things and complaining about the lack of…
Following news reports that the Democratic Congressional Campaign Committee (DCCC) was breached via a spoofed donation website, the ThreatConnect Research team and Fidelis Cybersecurity teamed up…
It’s a well-known fact that nation states have almost unlimited cyber powers. Nation states with unlimited military resources, technical know-how and political…
When each nation’s best athletes compete at the Olympic Games, one city seemingly becomes the center of the universe. And…