Advanced Persistent Threats

Advanced Persistent Threats news, information, and how-to advice

emmanuel macron france
People walking with airplane in background

dirty numbers playground

Microsoft keeps to Bill Gates' roots of cybersecurity

A look at the software giant's startling cybersecurity statistics.

kaspersky logo flag

Researchers link Middle East attacks to new victim in Europe

Kaspersky Labs announced new research this morning that shows some links between the massive Shamoon attack that took down 35,000 computers in Saudia Arabia to a new attack against a target in Europe

cyber security insurance protection

New National Cyber Incident Response Plan

The NCIRP provides a consistent and common approach and vocabulary to enable the whole community to work together to manage cyber incidents seamlessly. The NCIRP directly responds to private sector requests for clarity on the roles...

microphone

Vendors respond to Cylance's new testing methods with AV-TEST

Earlier this morning, as part of a story on Cylance's claims that AV-Comparatives was using deceptive testing methodologies and pirated software, Salted Hash revealed details on a new test Cylance commissioned with AV-TEST. We reached...

ransomware locked computer stock image cropped

Ransomware 2.0: Anatomy of an emerging multibillion business

What to expect from and how to resist the fastest growing sector of cybercrime in 2017?

machine learning

AI isn't just for the good guys anymore

Criminals are beginning to use artificial intelligence and machine learning to get around cyber defenses

binary monitor tech digital moody hacker threat

Report: Attack numbers fell last quarter, but attacks were more targeted and sophisticated

The total number of cybersecurity attacks fell by 35 percent in the last quarter of 2016, according to a new report, but the attacks became more targeted and sophisticated. Instead of general-purpose exploit kits and broad scanning,...

server cables orange

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in...

Injection syringe needle vaccinate

Is antivirus getting worse?

Anti-virus software is getting worse at detecting both known and new threats, says a new report. Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, while detection rates for...

armor knight protect

Don't predict, protect

How businesses can actually protect themselves against a variety of threats.

When your threat intelligence just isn’t producing value you need to pivot

Josh Lefkowitz of Flashpoint shares his experience leading the pivot from threat intelligence to business risk intelligence and explains the enterprise benefit for security leaders

zero days poster

Shall we care about zero-day?

Gartner says that 99% of exploited vulnerabilities are publicly known. Does it mean we can ignore zero-days?

flooded house

Flood of threat intelligence overwhelming for many firms

Three years after Target missed alerts warning them abut a massive data breach, the amount of threat information coming in from security systems is still overwhelming for many companies, due to lack of expertise and integration issues....

hunting orange

It’s hunting season but who’s the prey?

There’s a trend in security operations to work to close the gap between discovering a breach after the damage has been inflicted, and delving deeper into the infrastructure to evaluate the “What/Where/When/How” in an effort to advance...

shamed

Name and shame cybersecurity: a gift for cybercriminals?

Cybersecurity “name and shame” practice may significantly boost global cybercrime.

Cyber security breach attack on monitor with binary code

IT audits must consider the cyber kill chain and much more!

Its not enough to perform an IT audit to achieve compliance alone, Today's threat landscape includes sophisticated APT's, Advanced Persistent Threats, Remote access Trojans and Ransomeware to name a few, In order for an IT audit to...

rich banker cigar money fire greed

Cybersecurity: is it really a question of when, not if?

Can you imagine your banker saying “it’s not a question of if I lose your money, but when will I lose your money”?

security group team circuitry

Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?”

Load More
You Might Also Like