Security Experts:

long dotted


Threat actors lure victims with fake collaboration opportunities and then use the hijacked accounts to broadcast cryptocurrency scams. [Read More]
Aura, a company that provides cybersecurity solutions for consumers, announced raising $200 million at a $2.5 billion valuation. [Read More]
Designed to redirect traffic to a custom proxy, FiveSys is the second rootkit within the past five months to feature a digital signature issued by Microsoft. [Read More]
The two worked for an organization providing bulletproof hosting to malware families such as Citadel, SpyEye, Zeus, and the Blackhole Exploit Kit. [Read More]
Three former executives of now defunct email security firm GigaTrust have been charged for defrauding investors and lenders in a $50 million scheme. [Read More]
The latest iteration of the Chrome browser ditches support for the FTP protocol and removes several features to improve security. [Read More]
Armed with an exploit chain targeting CVE-2021-21224 and CVE-2021-31956, the EK can now target Chromium-based browsers on Windows systems. [Read More]
Acer has confirmed that, in addition to servers in India, hackers breached some of its servers in Taiwan, but claims no customer data was compromised. [Read More]
CISA warns that the BlackMatter ransomware has targeted multiple critical infrastructure entities in the United States, including organizations in the food industry. [Read More]
Symantec is warning about a threat actor targeting multiple entities in South Asia, with a focus on Afghanistan - for data theft and cyberespionage. [Read More]


rss icon

Derek Manky's picture
Botnets are becoming more malicious, sometimes able to create hundreds of thousands of drones that can attack a variety of machines, including Mac systems, Linux, Windows systems, edge devices, IoT devices, and so on.
Idan Aharoni's picture
Despite having different infrastructure, goals and methods, threat actors do not work in a vacuum. They feed off of each other.
Derek Manky's picture
How can organizations fight ransomware? The best solution is always prevention. Here are three tactics toward that goal.
Joshua Goldfarb's picture
The question of the importance of the state of a client device is a debate that has been around for a few years in the security field.
Idan Aharoni's picture
Plausible deniability provides a massive operational leeway to military operations in cyberspace, enabling governments to take actions without risking an all-out war.
Keith Ibarguen's picture
Leveraging humans for detection makes it hard for the attackers to predict whether or not their malicious emails will be identified and using technology to automate response provides scale and speed in resolution.
Idan Aharoni's picture
The fact that so many large and high-profile enterprises fall prey to ransomware attacks that in many cases does not pose any new technical challenge suggests that there are still many gaps that needs to be closed.
Derek Manky's picture
We tend to focus on the attack surface when it comes to cybersecurity, but the reality is, much like an iceberg, there’s so much more lurking beneath the surface.
Gordon Lawson's picture
Threat hunting must be non-attributable, while maintaining a clear audit trail to satisfy legal and governance requirements.
Idan Aharoni's picture
Fraudsters will determine who to target within the industry based on each service’s fraud prevention policies and maturity, rather than generally targeting the industry.