Battling the Botnet Armies
Marie Hattar wrote an interesting post about Battling the Botnet Armies that I would like to share.
"Botnet armies have become bigger, more active and more...
Dyre Authors Apparently Working on New Banking Trojan
Eduard Kovacs wrote an interesting post about Dyre Authors Apparently Working on New Banking Trojan that I would like to share.
"At least one of the...
Researchers Build Configuration Extractor for Locky Ransomware
Ionut Arghire wrote an interesting post about Researchers Build Configuration Extractor for Locky Ransomware that I would like to share.
"Researchers from Cisco Talos have created a new tool...
Breaking the OODA Loop!
Lance Cottrell wrote an interesting post about Breaking the OODA Loop! that I would like to share.
"The OODA loop is a well established concept often...
A Spell Check Equivalent for Building Security In
Jim Ivers wrote an interesting post about A Spell Check Equivalent for Building Security In that I would like to share.
"I can honestly say that spell...
Want Better Security? Be a Pragmatist.
Joshua Goldfarb wrote an interesting post about Want Better Security? Be a Pragmatist. that I would like to share.
"I’ve always considered myself a pragmatist. Perhaps not...
Using Apache Hadoop to Meet Cybersecurity Challenges
Rocky DeStefano wrote an interesting post about Using Apache Hadoop to Meet Cybersecurity Challenges that I would like to share.
"Apache Hadoop turned 10 this year.
What...
Malware Increasingly Abusing WMI for Evasion
Ionut Arghire wrote an interesting post about Malware Increasingly Abusing WMI for Evasion that I would like to share.
"Malware is increasingly using Windows Management Instrumentation...
How to Make Threat Intelligence Practical for Your Organization
Adam Meyer wrote an interesting post about How to Make Threat Intelligence Practical for Your Organization that I would like to share.
"f there is a...
The Cyber Risk of Mixing Business with Pleasure
Alastair Paterson wrote an interesting post aboutThe Cyber Risk of Mixing Business with Pleasure that I would like to share.
"Technical and Process Controls for the...
MOST POPULAR
Data Entry Job Offers in Southeast Asia Could Be Cyber Crime...
In recent revelations by Indian police authorities collaborating with counterparts in Sri Lanka and Singapore, a disturbing trend has emerged: hacking syndicates are preying...