McAfee expands Comprehensive Threat Protection
At the RSA Conference, McAfee announced expanded capabilities to find, freeze, and fix advanced threats faster to win the fight against advanced and evasive targeted attacks. …
Top ten points in the fight against cybercrime
At a summit of regulators and intelligence chiefs yesterday, the business secretary, Vince Cable, issued a timely warning to all in attendance of the vulnerability of …
Motivation and techniques of world’s most sophisticated cyber attackers
CrowdStrike released “CrowdStrike Global Threats Report: 2013 Year in Review,” the product of its year-long study of more than 50 groups of cyber threat actors. …
Top 7 security concerns for 2014
AhnLab announced its “Top 7 Security Concerns for 2014”. Because AhnLab is immersed in the cyber trenches and the cloud, its team is very experienced monitoring …
What’s the greatest security risk?
While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …
The state of targeted attacks
Trusteer announced the results of a recent study on the State of Targeted Attacks, which took into consideration the feedback from over 750 IT and IT security practitioners …
The operations of a cyber arms dealer
FireEye researchers have linked eleven distinct APT cyber espionage campaigns previously believed to be unrelated, leading them to believe that there is a shared operation …
Reactions from the security community to the Adobe breach
Hackers have breached Adobe’s network and have made off with personal, account, and encrypted financial information of nearly 3 million Adobe customers, as well as the …
Icefog cyber espionage campaign exposed
Kaspersky Lab’s security research team discovered Icefog, a small yet energetic Advanced Persistent Threat (APT) group that focuses on targets in South Korea and Japan, …
LynuxWorks releases a rootkit detection system
LynuxWorks announced the RDS5201, a new product to help detect the rootkit. Built on the LynxSecure 5.2 separation kernel and hypervisor, this small-form-factor appliance has …
NetTraveler APT group is back, adds watering hole attacks to its arsenal
The “Red Star” APT group employing the NetTraveler malware family is still active, but has changed its modus operandi. Its targets remain the same: government …
The TAO of NSA
In last week’s reports, it has been pointed out that NSA has its own hacking unit called Tailored Access Operations (TAO), and that its capabilities have been tapped for …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints