It was way back in 2011 when I spoke of the key security challenges on the CISO’s radar in the…
Browsing: Threat Intelligence
ESET and the Ponemon Institute have conducted a study which revealed an alarming increase in cyberattacks against healthcare organisations. According…
Malware and potentially unwanted applications (PUAs) have become overwhelmingly polymorphic, with 97 percent of malware morphing to become unique to…
The volume of malware targeting users of mobile devices grew more than three times in 2015, compared to 2014. The…
Turkish hackers have claimed responsibility for the ransomware cyber attack which hit an LA hospital recently. The hackers boasted “So…
Research by Kaspersky Lab and B2B International shows that businesses don’t need to have external interfaces such as public websites,…
Google have launched a new service, Project Shield, which will cache independent news websites in order to protect them from…
Researchers from Cylance have outlined a sustained 5-year APT campaign targeting Japanese Critical Infrastructure using dynamic DNS domains and customized…
325Gbps / 115 Mpps SYN flood mitigated. The attack occurred in mid-December and is one of the largest to ever…
Technology adoption is bringing about massive change in major cities around the world from smart traffic lights to knowing exactly…