Article / Jun 21, 2018
With the vast availability of new exploits and the competition for victims’ resources, the multi-exploit trend continues to be popular among attackers.
Blog / Jun 15, 2018
Singapore saw a sharp rise in attacks targeting a variety of ports, from SIP clear-text (5060), Telnet, SQL, and host-to-host ports to those used for remote router management and proxy servers and caching.
Blog / Jun 12, 2018
Don’t think your company is immune from nation-state APTs going after your intellectual property. Take these essential steps to protect yourself.
Article / May 9, 2018
Panda malware is back in full force with three currently active campaigns that extend its targets beyond banking to new industries and organizations worldwide.
Blog / May 4, 2018
US-CERT TL18-106A alert underscores how insecure Internet systems really are and that ignoring the problem only increases the collateral damage.
Blog / May 2, 2018
When it comes to tallying the total cost of a data breach, lawsuits figure prominently, alongside repair costs, loss of reputation and sales, compliance penalties, and operational downtime.
Byline / Apr 19, 2018
Fun Fact #2: the author is looking forward to being a card-carrying Singaporean crime fighter (temporarily) someday.
Blog / Apr 17, 2018
Savvy CISOs don’t go it alone; they rely on in-house collaborators (outside of the security team) to help achieve the organization’s security objectives.
Article / Apr 12, 2018
Attackers are targeting a Windows IIS vulnerability first disclosed a year ago to mine Electroneum.
Blog / Apr 10, 2018
Critical apps are the ones that must never go down or be hacked. They are also the hardest to defend because they are often massive, ancient, and touch everything.
Article / Apr 6, 2018
The latest DDoS trends include the return of large volumetric DDoS attacks, the rise of application targeted attacks, and businesses in Europe and Asia are growing targets.
Byline / Apr 3, 2018
People are mining coins all over the place-all it costs is money for the power bill. So, of course, clever people are figuring out how to use other people’s power to mine cryptocurrency.
Article / Mar 28, 2018
Apache Struts 2 Jakarta Multipart Parser RCE crypto-mining campaign is now targeting Windows, not just Linux systems.
Blog / Mar 22, 2018
Seven steps for improving the security of critical infrastructure systems—and protecting the public from unnecessary risk.
Blog / Mar 20, 2018
Laptops full of confidential data are still getting stolen, and public Wi-Fi hotspots are being booby-trapped. CISOs need to make users aware of the threat to prevent this from happening.
Report / Mar 13, 2018
IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.
Byline / Mar 9, 2018
Reaper is just one more blinking light in the faces of the InfoSec community reminding us that we need to get ahead of IOT madness.
Article / Mar 8, 2018
The rTorrent XML-RPC function configuration error targeted to mine Monero in February was also targeted in January in a campaign to spoof user-agents for RIAA and NYU.