Please turn on your JavaScript for this page to function normally.
Eyes
Targeted attack prevention in cloud email and messaging systems

GreatHorn announced the launch of the GreatHorn Threat Platform (GTP) at RSA Conference 2017. The Threat Platform extends the capabilities of the company’s cloud-native …

Netflix
Picky ransomware targets specific subset of would-be Netflix users

Aspiring Netflix users who don’t want to actually pay for the popular video on demand service are being targeted with a new type of ransomware. Detected as Netix by …

fish phishing
Phishers’ new social engineering trick: PDF attachments with malicious links

It is – or it should be – a well known fact that attackers occasionally email potential victims with PDF attachments containing malware or exploit code. But the …

Eyes
65% of social engineering attacks compromised employee credentials

Social engineering is having a notable impact on organizations across a range of industrial sectors in the US. In fact, 60 percent of surveyed security leaders say their …

face
Privileged user abuse and the insider threat

Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are …

world
New wave of targeted attacks focus on industrial organizations

Kaspersky Lab researchers discovered a new wave of targeted attacks against the industrial and engineering sectors in 30 countries around the world. Dubbed Operation Ghoul, …

criminal
Interpol arrests Nigerian scam mastermind who stole $60 million

The head of an international criminal network behind thousands of online frauds has been arrested in a joint operation by INTERPOL and the Nigerian Economic and Financial …

deep web
Cyber espionage group uses low profile tools to hunt high profile targets

Kaspersky Lab researchers investigated a threat actor that was undertaking aggressive cyber espionage activity in the Asian region, targeting multiple diplomatic and …

Warberry Pi
Tactical exploitation with Warberry Pi

WarBerry Pi was built for red team engagements where it’s essential to obtain as much information as possible in a short period of time, while going undetected. All you need …

Eyes
The life of a social engineer: Hacking the human

A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and …

danger
Cybercriminals increasingly exploiting human nature

Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data …

Hands
Know your enemy: The most popular hacking methods

Outsiders want to become insiders with the least possible effort, and insiders help them do so – mostly accidentally, according to Balabit. 54% of the survey respondents …

Don't miss

Cybersecurity news