<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

Infiltration by Design

Threat actors use several techniques against which we cannot prepare our defenses in advance. I tend to call these techniques “Infiltration by Design”, since attempting to ward off the threat actors using these techniques through...

Cyber-Security in 120 Secs: New Ransomware and Updates to BlackEnergy

It's the first week of 2016 and the industry has already witnessed three newly discovered ransomware and the continuous cyberespionage threat through malware that caused a power outage during Christmas.   

Highlighting the cyber-security...

Cyber Security 2016 Predictions: Amping the Traditional Cyber Kill Chain

I’ve been reading up a lot on 2016 predictions by analysts, peers and other vendors. While I agree with most of these predictions (moving towards a preventive approach, cyber-insurance guidelines will drive security initiatives, addressing...

Cyber-Security in 120 Secs: Backdoors in Juniper Firewalls and More

In this week’s news, Juniper locks the backdoor from an unwanted guest that looks to be state-sponsored.  Landry’s Inc., a restaurant chain is the latest victim of a PoS attack. AV-TEST, an independent software testing company, released...

ArdBot: An Inside Look into Malware in the Making

Crediting R136a1 who published malware samples a few days ago on a forum, we found these samples under development. We quickly went ahead and analyzed one, allowing us a unique view into malware at such an early development stage.

Cyber-Security in 120 Secs: Twitter Warns of Nation-State Attacks

This week hit a few sensitive strings with zero-days. Twitter releases warnings of government sponsored intrusions involving users’ accounts, a few good vendors release their mass of vulnerabilities and the F.B.I.’s Director reveals...

Cyber-Security in 120 Secs: 111,802,842 Compromised Healthcare Records

Healthcare hacks should have everyone’s full attention where there have been 111,802,842 victims of exposed health-related records so far in 2015. In other news, malware seem to be getting thirsty for a twist of PoS dropping to the bottom of...

You’re so predictable: the AV vulnerability that bypasses mitigations

Our research team exposed a critical security vulnerability appearing in various Anti-Virus (AV) products which has the potential to turn the Anti-Virus to an attack-enabler tool. This issue is not necessarily constrained to security...

Cyber-Security in 120 Secs: POS Malware and the Cost of Breaches

The holiday brings cheer, tears and fear of the next PoS malware.  Just this week, two published PoS malware discoveries "Pro Pos" and "ModPOS". Don't let those pesky PoS malware affect your retail sales, stay protected from them and future...

Cyber-Security in 120 Secs: Breaches Hit Hospitality and More

This week both Starwood Hotels and Resorts and Wilderness Resorts reported breaches on their credit card payment systems. Pearson VUE claims a third party is responsible in illegally obtaining data from the Pearson Credential Manager (PCM)...