Understanding the Relationship Between AI and Cybersecurity
The first thing many of us think about when it comes to the future relationship between artificial intelligence (AI) and cybersecurity is …
The first thing many of us think about when it comes to the future relationship between artificial intelligence (AI) and cybersecurity is …
Warning: Vendors rushing to attribute online attacks may appear faster than a …
We assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper. We have observed …
A group of hackers believed to be associated with Russia’s Main Intelligence Directorate (GRU), better known as APT28 or Fancy Bear, was …
Van de Wiele sees something verging on sinister from this latest push by Europol. “This is another attempt by law enforcement to try and …
Speaking in the keynote theatre at Infosecurity North America on “Profiling the Agile Cyber Adversary”, Jeffrey Tricoli, section chief …
Passive collection involves harvesting data while it’s in transit between hop points in Agency-B’s infrastructure or between the victim’s …
The New York Times this week published a fascinating story about a young programmer in Ukraine who’d turned himself in to the local police. The Times says the man did so after one of…
Whodunnit? The superior detective dazzles us with brilliance, skill, and patience to unmask the bad guy. Read full news article on Trend Micro
For years security experts have wrestled with the importance of hacker attribution, namely because it is difficult to achieve. But Avivah Litan, a featured speaker at Information Security Media Group’s…
Another week goes by and yet again we have another ransomware family spreading via the reported NSA toolkit that was published months ago by the notorious hacking group that goes…
Since June 27th we have been investigating the outbreak of the new Petya-like malware armed with an infector similar to WannaCry. Since day one, various contradicting theories started popping up. Read full news…
The Shadow Brokers say they will be accepting Zcash for subscriptions to their monthly dumps of leaked NSA files — a decision intended to needle the U.S. government over its role in the…
The world is full of hackers. There are hackers who do espionage work for various governments, hackers who hunt for bugs to help companies fix their products, and those who…