March 25, 2015 Trouble at the BIOS Level: LightEater Malware Proof of Concept Shows Major Security Risk 2 min read - Two researchers at the CanSecWest conference showed how the LightEater malware could infect the BIOS in most hardware to take over systems and steal data.
March 16, 2015 Using Natural Language Processing to Identify Malicious Domains 3 min read - Cybercriminals using similar lexical styles when establishing domains to phish from allow analysts to spot them via natural language processing techniques.
Advanced Threats February 23, 2015 Carbanak: How Would You Have Stopped a $1 Billion APT Attack? 5 min read - Kicking off 2015 with a bang, a well-orchestrated advanced persistent threat attack dubbed Carbanak has hit banks across the globe.
Advanced Threats February 17, 2015 Cybercriminals Leverage Massively Distributed Malware in APT-Style Attacks 3 min read - A new variant of the Dyre Trojan, a type of massively distributed malware, is being used to attack victims using Microsoft Outlook in APT-style attacks.
November 11, 2014 Darkhotel Malware Targets Hotel Guests in Sophisticated Data-Theft Campaign 3 min read - A malicious hacking crew, possibly based out of South Korea, has been quietly stealing data from high-level hotel guests with the Darkhotel malware.
Malware November 3, 2014 Uncloaking the Dark Arts of Evasive Malware 4 min read - With all the security breaches, it seems like cybercriminals keep getting through. Malware is evolving to evade detection by traditional defenses.
Malware October 8, 2014 JPMorgan Chase Breach Puts Renewed Focus on Malware Attacks at Large Organizations 3 min read - The recent breach of JPMorgan Chase's network — one of the biggest in history — may have been caused by malware compromising an employee's PC.
Endpoint September 29, 2014 Corporate Credentials Protection: Do You Know Where Your Passwords Are? 3 min read - Protecting corporate credentials is becoming increasingly important as more high-profile breaches have compromised hundreds of millions of user accounts.
CISO September 24, 2014 How a CISO Can Use Home Field Advantage to Defeat Attackers 4 min read - How CISOs and security leaders should use their home field advantage and play to their strengths to win the battle against malicious attackers.
Banking & Finance September 15, 2014 Dyre Banking Trojan Used in APT-Style Attacks Against Enterprises 3 min read - SalesForce is warning its customers that they might have been targeted by the Dyre Trojan. Banking trojans are not just targeting financial organizations.