Quantcast
Channel: Threat Geek
Browsing all 87 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cyber Scoop: July 10, 2015

This Week in Cybersecurity NewsHacking Team gets Hacked: Invoices Suggest Spyware Sold to Repressive Govts by Dan Goodin, Ars TechnicaItaly- based Hacking Team, which specializes in weaponized spyware...

View Article


Image may be NSFW.
Clik here to view.

THREATTOONS: ARE YOU AWARE OF THE MOST DANGEROUS THREATS?

View Article


Image may be NSFW.
Clik here to view.

Black Hat USA 2015: A Look at the Week Ahead

We’re less than a week away from Black Hat USA 2015. Following an exciting few months here at Fidelis Cybersecurity, we’re looking forward to catching up with everyone in Las Vegas and have a week...

View Article

Image may be NSFW.
Clik here to view.

Fidelis Threat Advisory #1018 Overview: Looking at the Sky for a DarkComet

Fidelis Threat Advisory #1018Looking at the Sky for a DarkCometFirst created in 2008, DarkComet is an efficient function-rich remote access tool (RAT) that has been leveraged against various targets....

View Article

Image may be NSFW.
Clik here to view.

DarkComet Thrives, Not So Easy to Extinguish

Use of remote access tools (RATs) is a tried and true cyber espionage tool favored by a diverse group of threat actors. They have been used to enable many of the recent, high profile breaches including...

View Article


Image may be NSFW.
Clik here to view.

Good Malware Never Dies: AlienSpy Reborn as JSocket

News of the murder of Argentinian prosecutor Alberto Nisman linked to an unique version of AlienSpy takes another turn. Last week we began tracking organizations in the U.S., UK and Germany that were...

View Article

Image may be NSFW.
Clik here to view.

Combined Network and Endpoint Visibility Vital to Combating Advanced Threats

Security teams are continuously challenged in monitoring and securing network infrastructures, connected endpoints, and appliances in order to protect complex and technologically evolving corporate...

View Article

Image may be NSFW.
Clik here to view.

All Threat Intelligence Feeds Are Not Equal

It seems you can’t throw a rock without hitting a new security startup that creates, consumes, manages or integrates threat intelligence. The term “threat intelligence” is one of the least agreed upon...

View Article


Image may be NSFW.
Clik here to view.

Compromised Networks Mean Compromised Careers - The Ashley Madison Affair...

Today’s breaking news around the dismissal of Ashley Madison’s CEO Noel Biderman comes as no shock following the aftermath of their recent breach. More and more CEOs are taking the blame and suffering...

View Article


Image may be NSFW.
Clik here to view.

Taming the Tiger: Domestic and foreign policy complexities in curbing China's...

For years China has engaged in a systematic process to extract intellectual property and state secrets from the United States in direct support of their five-year plans.A Brief HistoryGiven the United...

View Article

Image may be NSFW.
Clik here to view.

Password Hygiene: Hiding Your Identity is Difficult for Attackers and Adulterers

Let’s say you’re an individual who wants to start engaging in naughty behavior online but the Ashley Madison dump has made you skittish. Engaging in bad behavior (and for that matter crime) is pretty...

View Article

Image may be NSFW.
Clik here to view.

Cyber-Brinkmanship: Xi and Obama’s Non-Summit Trilogy

The irony of this week’s summit meeting between President Obama and China’s President, Xi Jinping, is that these two heads of state may be powerless to stop the silent cyber conflict that they are...

View Article

Image may be NSFW.
Clik here to view.

Why healthcare firms are overdue for a cyber cataclysm

Healthcare has remained on the fringes of direct cyber targeting, but the value of health data now places many organizations inline for a cyber catastrophe.  Today, a government report found security...

View Article


Image may be NSFW.
Clik here to view.

Why are financial services struggling to detect cyber intrusions?

Every major breach targeting financial services organizations involves compromised credentials.  Knowing this, one could state that if an organization can ensure that their credentials are not...

View Article

Image may be NSFW.
Clik here to view.

World Leaders Xi and Obama’s Flawed Cybersecurity Agreement

 The prevailing opinion, amongst my comrades here at Fidelis Cybersecurity, and other notables in the cyberdefense community is that this agreement is flawed, and only a half measure.  This will not...

View Article


Image may be NSFW.
Clik here to view.

Arming the Boardroom Part 1: Empowering Board Directors in their Battle...

Over the past three to five years, organizations have witnessed cyber attacks growing in scope, complexity, and severity. The nature of cyber attacks has evolved from the theft of financial data and...

View Article

Image may be NSFW.
Clik here to view.

Arming the Boardroom, Part 2: Know Your Enemy

My last post introduced Fidelis Cybersecurity’s effort to empower board members in their battle against cyber attacks by offering real-world counsel regarding the management of incident response via a...

View Article


Image may be NSFW.
Clik here to view.

Cyber Crime: Eastern Europe and Russia Continue to Refine Operations

According to recent Interpol findings, cybercrime originating from Russia and Eastern Europe continues to increase, as attackers broaden their capabilities and gain technical sophistication. Recent...

View Article

Image may be NSFW.
Clik here to view.

EU’s GENERAL DATA PROTECTION REGULATION REGIONAL FRAMEWORK

Driven in part by the onslaught of high-profile data breaches, such as Target, Sony, Anthem and Ashley Madison, the European Union (EU) is reforming its data protection legislation. The “General Data...

View Article

Image may be NSFW.
Clik here to view.

Senate Passes CISA Procedural Amendments as Privacy Concerns Heat Up

Recently, Apple stated its opposition to a controversial cybersecurity bill in which initial amendments passed today in the Senate. The Cybersecurity Information Sharing Act (CISA) has been marketed as...

View Article
Browsing all 87 articles
Browse latest View live