The results of a security preparedness survey reveal that more than half of organizations aren't ready to defend against online extortion and data breaches.
Well-designed attacks proceed in six components that show how attackers progress within their targets. Learn about the components that make for a successful campaign to know how to form a proper threat response plan.
The defensive measures companies can take to respond to a targeted attack, from securing sensitive data to intrusion detection and forming an incident response team.
For many organizations, the question is no longer if they fall victim to a targeted attack, but when. In such an event, how an organization responds will determine whether it becomes a serious event or if it stays a mere annoyance.
This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.