Threat Intelligence

Two Israeli Youths May Be Charged for vDOS Operation

Israeli authorities prepare to accuse two 18-year-olds for the online attack service, which caused $1.65 million in losses.

Hacking the Business Email Compromise

BEC attacks are on the rise, but plain-old spoofing of business executives' email accounts remains more prevalent.

FBI: Attackers Targeting Anonymous FTP Servers in Healthcare

The FBI warns medical and dental organizations of cybercriminals targeting anonymous FTP servers to steal personal health data.

Symantec Seeks to Quell CA Customer Concerns over Google Warning

Exec at Symantec spells out what company will do if Google follows through on its proposed plans to degrade trust in Symantec certs.

Data Visualization: Keeping an Eye on Security

Visualization can be one of the most powerful approaches a security team can use to make sense of vast quantities of data.So why does...

40% of Discarded Digital Devices Contain Personal Data

NAID study of 250 devices in resale markets found tablets contained the most recoverable personal information.

Cybercriminals Exploit March Madness Frenzy

Users are clicking on dubious links to stream matches and exposing confidential data to hackers, says Zscaler.

Google Slams Symantec for ‘Failures’ in SSL/TLS Certificate Process

Google Chrome engineers railed on Symantec for allegedly issuing thousands of security certificates that had not been properly validated.

Apple: Mac, iPhone Bugs That CIA Allegedly Exploited Were Fixed Years...

New WikiLeaks data dump describes "Sonic Screwdriver," other CIA exploits for Mac desktops and iPhones

Intro to Cyber Insurance: 7 Questions to Ask

Buying a cyber insurance policy can be complex and difficult. Make sure you're asking these questions as you navigate the process.

America’s JobLink Suffers Security Breach

A third-party hacker exploited a flaw in America's JobLink application code to access the information of job seekers from 10 states.

Sandia Testing New Intrusion Detection Tool That Mimics Human Brain

Neuromorphic Data Microscope can spot malicious patterns in network traffic 100 times faster than current tool, lab claims.