Threats and Breaches

Threats and Breaches

Project Lakhta: Russian Meddling Gets Russians Indicted

Project Lakhta: Russian Meddling Gets Russians Indicted

/
The U.S. Department of Justice (DoJ) announced Feb.16 that a Federal grand jury dropped the hammer on a gaggle of Russian citizens and three Russian entities for their hand in the meddling ...
Security Boulevard’s 5 Most-Read Stories for the Week, Feb. 12-16

Security Boulevard’s 5 Most-Read Stories for the Week, Feb. 12-16

/
Another week has gone by with our fair share of security stories. This week the 2018 Winter Olympic Games dominated the headlines, as well as the cyberattacks on the Olympics website. Missed ...
PowerShell Language Modes-Part 1

PowerShell Language Modes-Part 1

/
In this article, we will discuss various PowerShell language modes. In Part 1 we will look at all the basics around PowerShell language and its various types. In Part 2 we will ...
How Security Team’s Handle Malware Analysis

How Security Team’s Handle Malware Analysis

/
During our webinar focused on the Qadars Banking Trojan there was a great deal of analysis provided on just how evasive the threat is. This begs the question, how does your team ...

CISOs should report directly to the CEO, study shows

/
Keeping senior leadership abreast of security strengths and vulnerabilities has become a top priority, according to financial sector Chief Information Security Officers (CISOs). And direct communication with the CEO has become imperative, ...

Android ransomware info from ESET

/
ESET: blog article and pointer to paper. Android ransomware in 2017: Innovative infiltration and rougher extortion “To find out more about ransomware on Android, the nastiest variants of the past year, as ...

Android ransomware info from ESET

/
ESET: blog article and pointer to paper. 'Android ransomware in 2017: Innovative infiltration and rougher extortion' ...
Are You Protected Against Burst Attacks?

Are You Protected Against Burst Attacks?

/
Common DDoS attacks come in the form of sustained, high-volume traffic floods that ramp up gradually, reach a peak, and are then followed by either a slow or a sudden descent. In ...
How a Bitcoin phishing gang made $50 million with the help of Google AdWords

How a Bitcoin phishing gang made $50 million with the help of Google AdWords

/
A cybercrime gang based in Ukraine is estimated to have made as much as $50 million after tricking Bitcoin investors into handing over the login credentials for their online wallets. The post ...
NotPetya/GoldenEye back in the spotlight: UK officially points finger to Kremlin for June 2017 cyberattack

NotPetya/GoldenEye back in the spotlight: UK officially points finger to Kremlin for June 2017 cyberattack

/
2017 has already gone down as the worst year on record from a cybersecurity standpoint. But the world is still not over the two infamous attacks deployed by hackers in May (WannaCry) ...
Loading...