Security News

Threat hunting in the modern attack landscape
2018-09-11 15:00

LIVE Broadcast Promo New research from Carbon Black shows that a staggering 92 per cent of UK businesses have been breached in the past year and nearly half of companies have reported falling...

Alert: 'Ryuk' Ransomware Attacks the Latest Threat
2018-09-07 20:33

Variant of Hermes Poses Major Risks, HHS WarnsOrganizations should be on guard for an attacks involving apparent variant of Hermes ransomware - dubbed Ryuk - that attempts to encrypt network...

Why Managed Threat Hunting?
2018-09-07 17:33

Increasingly, threat hunting is a practice that enterprises want to understand and implement. But it is not always feasible to do so in-house, given the demand for resources and skills. That's...

Threat Actors Eyeing IQY Files To Peddle Malspam
2018-09-07 13:08

The Necurs Botnet, DarkHydrus and other threat actors are turning to the inconspicuous files.

Leader of DDoS-for-Hire Gang Pleads Guilty to Bomb Threats
2018-09-06 15:51

A 19-year-old man from the United Kingdom who headed a cybercriminal group whose motto was "Feds Can't Touch Us" pleaded guilty this week to making bomb threats against thousands of schools. On...

19-Year-Old Hacker Arrested Over Making Hoax School and Flight Bomb Threats
2018-09-06 13:18

British police have arrested a 19-year-old teen who is an alleged member of Apophis Squad cybercriminal group responsible for making hoax bomb threats to thousands of schools and airlines; and...

GDPR Spurs Interest in Insider Threat Prevention
2018-09-04 18:33

Tony Pepper of Egress Software Technologies on Breach Detection InnovationsThe EU's General Data Protection Regulation, which has tough breach notification requirements, is spurring global...

New Threat Actor ‘Rocke’: A Rising Monero Cryptomining Menace
2018-08-30 20:35

A threat actor been spotted on a number of honeypots looking to download and execute malicious cryptomining malware.

Cobalt Group Targets Banks in Eastern Europe with Double-Threat Tactic
2018-08-30 15:27

The campaign uses double infection points and two command-and-control servers.

The 4 Critical Building Blocks for Digital Threat Hunting
2018-08-29 17:15

Having the right set of broad data is the linchpin to effective threat-hunting.