APT (Advanced Persistent Threats)

New APT Group Mimic Colonial Pipeline Attackers, Others
Government servers and Russian energy and aviation industries seem to be the primary targets of a new advanced persistent threat (APT) group that has attacked organizations in 10 countries, using the supply ...
Cybersecurity New Year’s Resolutions from the Information Security Forum
It’s that time of year again. Time for every one of us to reminisce on the past year and make resolutions for how we can do better in the year ahead–particularly in ...
Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles
Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or ...

Using Machine Learning to Reduce False Positives
Today’s threat landscape is massive and expanding at an alarming rate—especially given the explosion of mobile devices, hybrid cloud environments, DevOps, and containers. Organizations of all sizes, and across all industries, struggle ...

Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook
…and vice versa. That should be part of the title too, but it was already quite lengthy. On this episode of The Inner Circle, I am joined by Kevin Livelli, Director of ...

Hackathon Uses Machine Learning to Improve Cybersecurity
Machine learning (ML) and artificial intelligence (AI) are hot technologies with significant promise for shaping the future, but it isn’t enough to understand ML or AI theory. Sure, you can gain a ...
6 Best Computer Forensic Analysis Tools
Computer forensics is of much relevance in today’s world. Though forensic analysis refers to searching and analyzing information to aid the process of finding evidence for a trial, computer forensic analysis is ...

Cylance Report Reveals Malware and Tactics of OceanLotus Group and Weakness of Traditional AV
Exploits and attackers come in various forms. Just like crime in real life, there are vandals and people just trying to wreak havoc, there are petty thieves and lone wolf criminals, and ...