December 17, 2015 No-Xbox Xmas? Anonymous Hackers Threaten Gaming Network Takedowns 2 min read - Anonymous hackers are threatening to take down gaming networks during the week of Christmas — again. But how real are these threats?
Advanced Threats December 9, 2015 Eight Crazy Hacks: The Worst and Weirdest Data Breaches of 2015 4 min read - 2015 was a big year for cybercriminals. Here's a look at eight of the biggest hacks from the past 11 months and what we can learn from them.
CISO December 7, 2015 Economic Espionage: The Perfect Storm 3 min read - A culture of economic espionage may thrive in places where corruption and organized crime reigns supreme. What should companies know about this threat?
Threat Intelligence December 2, 2015 Researching the Psychology of Hackers 3 min read - Mary Aiken, the director of the CyberPsychology Research Center (CPRC) in Dublin, is leading the charge in the study of the psychology of hackers.
November 13, 2015 Cherry Picker Malware Leaves Without a Trace After Attacking POS Systems 2 min read - A new POS malware known as Cherry Picker has shown the ability to erase itself from a machine, making it incredibly difficult to detect.
Intelligence & Analytics November 12, 2015 Hacking Contests Drive Millennials to Cybersecurity 2 min read - It's no secret that the cybersecurity talent shortage is one of the biggest challenges facing our industry — but there is action being taken.
October 15, 2015 Duped Digital Certificates: Major CAs Accused of Fueling Fraudsters 2 min read - CAs aren't keeping up their end of the bargain: According to Netcraft, many have been issuing digital certificates to scam websites.
October 14, 2015 Out in the Rain: Malware-Makers Extradited in US-EU Umbrella Agreement 2 min read - After four years, the US-EU Umbrella Agreement for cybersecurity is making progress. Soon, malware creators may have nowhere to hide.
September 29, 2015 XOR DDoS Attack Tool Being Used to Launch Over 20 Daily Attacks 3 min read - Threat actors are using a previously discovered DDoS attack tool to launch over 20 daily attacks against legitimate organizations, new research showed.
X-Force August 25, 2015 The Myth of the Omnipotent Hacker 3 min read - The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.