Advertisement
Top

Tag: Espionage


Hacker, Threats & Malware

How to handle the aftermath of being hacked

August 26, 2016

Via: CSO Online

After a company has been hacked and the hack has been discovered to be a harmful one, top executives and IT leaders normally huddle in a room to assess the loss. It’s usually not a pretty scene. It’s not as […]


Cyber warfare, Cyber-crime

A deeper look at business impact of a cyberattack

August 24, 2016

Via: CSO Online

Few would dispute that cyberattacks are increasing in frequency and in intensity, and most organizations confirm they have now suffered at least one cyber incident. But do those organizations have a true sense of the full impact on the organization? […]


Cyber warfare

Application layer DDoS attacks are on the rise

August 23, 2016

Via: CSO Online

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says. One such attack generated 8.7Gbps at its peak, “unheard of […]


Vulnerabilities

Attackers don’t need vulnerabilities when the basics work just as well

August 22, 2016

Via: CSO Online

You might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don’t need to target software or use fancy tactics to ruin a network and compromise sensitive data. Josh Abraham, a practice […]


Cyber-crime

Pawn Storm cyberspies still at work, target NATO and the White House

April 17, 2015

Via: cyber-crime

Pawn Storm, the long-standing economic and political #cyber–#espionage operation that has been first detailed in October 2014, continues unabated. Aiming to compromise the targets’ computers and Outlook accounts, the attackers send spear-phishing emails carrying malware and compromise websites to redirect […]