Threat Intelligence Center

Deep Web

The Deep Web and the Cybercriminal Underground
Leggi l'articolo


Ultimi aggiornamenti

Cybercriminal ‘Cloud of Logs’: The Emerging Underground Business of Selling Access to Stolen Data

We take a closer look at an emerging underground market that is driven by malicious actors who sell access to a gargantuan amount of stolen data, frequently advertised in the underground as “cloud of logs."
Leggi l'articolo

Security Strategies for Enterprises

News and updates on the latest security threats to enterprises, and strategy guides on how to deal with them.
Leggi l'articolo


Ultimi aggiornamenti

Ransomware Recap: Clop, DeathRansom, and Maze Ransomware

As the new year rolls in, new developments in different ransomware strains have emerged. Here we discuss the different techniques that Clop, DeathRansom, and Maze ransomware use and the ways users and organizations can protect themselves against infection.
Leggi l'articolo

Targeted Attacks

The latest news and information on targeted attacks and IT security threats so you stay ahead of advanced persistent threats.
Leggi l'articolo


Ultimi aggiornamenti

From Espionage to Cyber Propaganda: Pawn Storm's Activities over the Past Two Years

This paper takes a look at Pawn Storm's operations within the last two years, and how the group has expanded their activities from espionage to the use of cyber propaganda tactics.
Leggi l'articolo

Securing ICS Environments

News and research on threats to ICS/SCADA and protecting systems behind critical infrastructure
Leggi l'articolo


Ultimi aggiornamenti

Dymalloy, Electrum, and Xenotime Hacking Groups Set Their Targets on US Energy Sector

At least three hacking groups have been identified aiming to interfere with or disrupt power grids across the United States. Attempts in attacking the utilities industry are on the rise, according to a report on the state of industrial control systems (ICSs).
Leggi l'articolo

Internet of Things

The IoT connects things, people, processes and networks through the internet, but it could also be open to attacks that target it.
Leggi l'articolo


Ultimi aggiornamenti

In Transit, Interconnected, at Risk: Cybersecurity Risks of Connected Cars

The use of connected cars continues to grow. While the vehicles’ link to technologies such as 5G and the cloud present opportunities for improving efficiency and safety, it can also attract risks from threat actors as well.
Leggi l'articolo

Mobile Safety

News and updates on the latest threats for the mobile platform, as well as guides on how to protect your mobile devices.
Leggi l'articolo


Ultimi aggiornamenti

Mobile Security: 80% of Android Apps Now Encrypt Network Traffic by Default

Google has provided an update stating that 80% of Android apps have adopted the HTTPS standard by default. HTTPS encrypts network traffic, preventing third parties from intercepting data from apps.
Leggi l'articolo