Security Experts:

long dotted


Malicious actors targeting a zero-day vulnerability in Sophos XG Firewall appliances last month attempted to deploy ransomware after Sophos started taking measures to neutralize the attack. [Read More]
Hacked websites in Israel, a reported cyberattack in Iran and a Twitter war between their leaders: the arch foes' animosity is flaring up online. [Read More]
Even though business is already subject to considerable government surveillance in many different forms, nevertheless business is led by individuals with individuals' attitudes towards privacy. [Read More]
Facebook said that its Messenger app will be watching behind the scenes for scammers using the smartphone communication system. [Read More]
Researchers have analyzed the GhostDNS exploit kit (EK), which is used to compromise a wide range of routers to facilitate phishing attacks targeting banking credentials. [Read More]
Hackers claim to have obtained over 200 GB of archived data from Australian shipping giant Toll and they have already started leaking it after the company refused to pay a ransom. [Read More]
Many Israeli websites were hit by a coordinated cyber attack, with the home pages replaced by images of the country's commercial capital Tel Aviv in flames. [Read More]
Subscription meal kit service Home Chef has confirmed that it recently suffered a data breach impacting customer information. [Read More]
Researchers have trawled the dark web to see how the underground is responding to the COVID-19 pandemic. [Read More]
Japan is investigating a possible leak of data including details of a prototype missile in a massive cyberattack earlier this year on Mitsubishi Electric. [Read More]


rss icon

Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Justin Fier's picture
CISA has recently designated many cyber security positions ‘essential roles', and our understanding of essential businesses and essential employees will continue to change as the pandemic evolves.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Laurence Pitt's picture
Many of us are familiar with the two most common types of socially engineered attacks – phishing and spear-phishing – but there are many more to be aware of.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
The holidays are also a bonanza for cybercriminals whose own sales and purchases of contraband on the dark web mirror the one-day-only specials of their consumer-facing counterparts.
Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.