Overcoming the strains facing cybersecurity
Consumers are no longer surprised by data breaches. And, the truth is that large scale data breaches are here to stay. In fact, according...
The Emergence of Dridex | LIFARS, Your Cyber Resiliency Partner
Dridex first appeared in 2011 and has been evolving into a greater threat since. The prolific banking trojan has raked in millions of dollars...
Righ Virus Archives – How to, Technology and PC Security Forum
Righ virus – what is it? righ virus recovery and removal instructions guide. How to remove righ virus? Is file restoration possible? Righ...
Kodiak und Merlin: Zwei neue Post-Exploitation Frameworks für Penetrationstester
Berichte über Hackerangriffe auf Unternehmen oder öffentliche Institutionen beschränken sich häufig darauf, dass die Angreifer eingedrungen seien –...
Microsoft to Stop Supporting Cortana on Android and iOS
Microsoft has announced that they will no longer support the Cortana digital personal assistant app on Android and iOS devices starting in 2020.
In support articles...
Massive Increase in Reconnaissance Activity – Precursor to Attack?
Update 2013-11-12: Watch our youtube discussion
Update 2013-11-05: Upon further examination of the traffic we can confirm that a large percentage is destined for TCP port 445. This...
Talos Blog || Cisco Talos Intelligence Group
Executive summary
Most users assume they are safe when surfing the web on a daily basis. But information-stealing malware can operate in the background of...
Two men busted for hijacking victims’ phones and email accounts – Naked Security
Police busted two alleged SIM-jackers in Massachusetts on Thursday and charged them with draining fat cryptocurrency wallets and hijacking OG social media accounts.
OG is...
Will PEMEX pay the $5M USD to hackers for the ransomware attack?
A couple of days ago web application security specialists reported a ransomware attack on Petroleos Mexicanos (PEMEX),...
Report: Organizations remain vulnerable to increasing insider threats
The risk and challenges insider threats pose to organizations are ever present, even before tech as we know it existed. The age of digitization...