Imminent threats

MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet. Related: Cyber…

1 year ago

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The convergence of DevOps and SecOps is steadily gaining traction in the global marketplace. Some fresh evidence of this encouraging…

1 year ago

NEW TECH: ICS zero-day flaws uncovered by Nozomi Networks’ analysis of anomalous behaviors

Andrea Carcano’s journey to co-founding a security company in the vanguard of defending critical infrastructure began at a tender age.…

1 year ago

MY TAKE: Here’s how ‘bulletproof proxies’ help criminals put compromised IoT devices to work

Between Q1 2019 and Q2 2019, malicious communications emanating from residential IP addresses in the U.S. – namely smart refrigerators,…

1 year ago

SHARED INTEL: Malware-ridden counterfeit phones place consumers, companies in harm’s way

A faked Rolex or Prada handbag is easy enough to acquire on the street in certain cities, and you can…

1 year ago

MY TAKE: A primer on how ransomware arose to the become an enduring scourge

“All we know is MONEY! Hurry up! Tik Tak, Tik Tak, Tik Tak!” This is an excerpt from a chilling…

1 year ago

GUEST ESSAY: 6 unexpected ways that a cyber attack can negatively impact your business

Cyber crime can be extremely financially damaging to businesses. However, if you believe that money is the only thing that…

1 year ago

MY TAKE: Let’s not lose sight of why Iran is pushing back with military, cyber strikes

It is not often that I hear details about the cyber ops capabilities of the USA or UK discussed at…

1 year ago

BEST PRACTICES: Do you know the last time you were socially engineered?

This spring marked the 20th anniversary of the Melissa email virus, which spread around the globe, setting the stage for…

1 year ago

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

Locking down firmware. This is fast becoming a profound new security challenge for all companies – one that can’t be…

2 years ago