Security Analytics

Analytics and Intelligence

Replace Your Exploit-Ridden Firmware with Linux - Ronald Minnich, Google

Worries over Intel’s Mangement Engine grow after new flaws found

/
What is the world’s most widely-used operating system on new PCs? Windows? Guess again ...
Terdot Trojan likes social media

Terdot Trojan likes social media

/
The Terdot Trojan is a banker, but it loves to steal your social networks credentials as well. Categories: Malware Malwarebytes news Threat analysis Tags: bankerfacebooksocial mediaterdottrojantwitter (Read more...) The post Terdot Trojan ...
Stainless-Steel-Reinforcing-Bars.jpg

Advanced Persistent Infrastructure

/
evilCurtis Jordan, writing at Dark Reading, regales us with a tale of Advanced Persistent Infrastructure, the underpinnings of cyber; and, today's paean to Threat Intelligence - Enjoy! Permalink ...

Machine learning to fix problem of 3.5 million unfilled cybersecurity jobs by 2021

/
Demand for cybersecurity experts will increase and become a priority for enterprises, leading to an estimated need for over 1 million cybersecurity professionals in India by 2020 and over 500,000 in the ...
OSX.Proton spreading through fake Symantec blog

OSX.Proton spreading through fake Symantec blog

/
A new variant of the OSX.Proton malware is being promoted via a fake Symantec blog site. Categories: Mac Threat analysis Tags: CoinThiefmalwareOSX.ProtonprotonProton malwaresymantecSymantec blogSymantec Malware Detector (Read more...) The post OSX.Proton spreading ...
Mobile banking Trojan sneaks into Google Play targeting Wells Fargo, Chase and Citibank customers

Mobile banking Trojan sneaks into Google Play targeting Wells Fargo, Chase and Citibank customers

/
Co-authored with Niels Croese (SfyLabs) and Lukas Stefanko (ESET) ...

Forever 21 informs customers of a potential data breach

/
The retailer doesn't know much yet, beyond the fact that encryption wasn't working in some devices, in some stores, for some amount of time ...
How Extremists Groups Radicalize Recruits Online

How Extremists Groups Radicalize Recruits Online

/
Anyone with access to the internet can have their voice heard. And this is exactly the philosophy behind the extremist online radicalization and recruitment efforts of various terrorist organizations, including Hezbollah and ...

Superior Integrity Monitoring: Getting Beyond Checkbox FIM

/
If File Integrity Monitoring (FIM) were easy, everyone would be doing it. Actually, it is pretty easy. It’s not exactly rocket science. Practically anyone with a modicum of Python, Perl or development ...

Shadow Brokers cause ongoing headache for NSA

/
It's not been a great few years for the NSA when it comes to breaches ...
Loading...