Article / Jul 19, 2018
Cyber attackers seem to follow President Trump to every important international meeting, but Russia was not the main source of cyber attacks during the recent Trump-Putin meeting, China was.
Article / Jul 16, 2018
Threat actors continue to find creative yet relatively unsophisticated ways to launch new campaigns to reap profits from crypto-mining operations.
Byline / Jul 12, 2018
F5 Labs' Ray Pompon writes for HelpNetSecurity, discussing the grey areas of threat research and some common issues researchers encounter.
Byline / Jul 5, 2018
F5 Labs' Preston Hogue writes for SecurityWeek, discussing how the trend towards digital transformation is bringing data together in a way that provides intelligence to malicious actors.
Article / Jun 29, 2018
BackSwap demonstrates unique behavior in its manipulation of user input fields and its handling of International Bank Account Numbers (IBANs).
Blog / Jun 26, 2018
Prioritizing speed over security can jeopardize the safety of your applications and data.
Article / Jun 23, 2018
Attackers continue to find new and creative ways to carry out malicious crypto-mining operations, employing multiple exploits in a single campaign.
Article / Jun 21, 2018
With the vast availability of new exploits and the competition for victims’ resources, the multi-exploit trend continues to be popular among attackers.
Blog / Jun 15, 2018
Singapore saw a sharp rise in attacks targeting a variety of ports, from SIP clear-text (5060), Telnet, SQL, and host-to-host ports to those used for remote router management and proxy servers and…
Blog / Jun 12, 2018
Don’t think your company is immune from nation-state APTs going after your intellectual property. Take these essential steps to protect yourself.
Article / May 9, 2018
Panda malware is back in full force with three currently active campaigns that extend its targets beyond banking to new industries and organizations worldwide.
Blog / May 4, 2018
US-CERT TL18-106A alert underscores how insecure Internet systems really are and that ignoring the problem only increases the collateral damage.
Blog / May 2, 2018
When it comes to tallying the total cost of a data breach, lawsuits figure prominently, alongside repair costs, loss of reputation and sales, compliance penalties, and operational downtime.
Byline / Apr 19, 2018
Fun Fact #2: the author is looking forward to being a card-carrying Singaporean crime fighter (temporarily) someday.
Blog / Apr 17, 2018
Savvy CISOs don’t go it alone; they rely on in-house collaborators (outside of the security team) to help achieve the organization’s security objectives.
Article / Apr 12, 2018
Attackers are targeting a Windows IIS vulnerability first disclosed a year ago to mine Electroneum.
Blog / Apr 10, 2018
Critical apps are the ones that must never go down or be hacked. They are also the hardest to defend because they are often massive, ancient, and touch everything.
Article / Apr 6, 2018
The latest DDoS trends include the return of large volumetric DDoS attacks, the rise of application targeted attacks, and businesses in Europe and Asia are growing targets.