Threat Intelligence

In Appreciation: Howard A. Schmidt

Former cybersecurity coordinator to President Obama, and renowned veteran of the security industry, passed away today.

Look The Other Way: DDoS Attacks As Diversions

Joe Loveless of Neustar talks about how DDoS attacks are shifting from simple disruption to more sinister continuous threats, and advises on what the...

Organizations In 40 Countries Under ‘Invisible’ Cyber Attacks

Unknown threat actors are stealing sensitive financial data using memory resident malware crafted from legitimate tools, Kaspersky Lab warns.

Kaspersky Lab: 323,000 New Malware Samples Found Each Day

Credit it to mass-produced malware and better detection through machine learning. Antivirus provider Kaspersky Lab has revealed that around 323,000 new malware files are being...

Chinese Threat Intel Start-up Finds DarkHotel Exploiting Chinese Telecom

New China-based threat intelligence company ThreatBook wants to be the 'trusted contact in China.' SAN FRANCISCO, RSA Conference -- The DarkHotel threat group is targeting...

Rethinking Vulnerability Disclosures In Industrial Control Systems

Why the security industry's traditional obsession and hype around vulnerabilities cannot be transferred to the ICS environment.

FBI: BEC Scam Attempts Amount to $3 Billion

FBI warns of rise in business email compromise frauds, says it should be reported immediately. The FBI is warning that there has been a sudden...

Survey: Most Attackers Need Less Than 12 Hours To Break In

A Nuix study of DEFCON pen testers shows that the usual security controls are of little use against a determined intruder

Mobile (In)security: Dark Reading Cartoon Caption Contest Winners

Clever word play on mobile ransomware, cloud and the Internet of Things.And the winners are ...

Internal Pen-Testing: Not Just For Compliance Audits Anymore

How turning your internal penetration team into a 'Friendly Network Force' can identify and shut down the cracks in your security program. When evaluating or...

Apple: Mac, iPhone Bugs That CIA Allegedly Exploited Were Fixed Years...

New WikiLeaks data dump describes "Sonic Screwdriver," other CIA exploits for Mac desktops and iPhones

5 Things To Consider With A Threat Hunting Program

A change in mindset and the ability to think like a malicious hacker are two key requirements. The constantly evolving ability of cyberattackers to get...