The US Federal Bureau of Investigation posted a warning about ransomware targeting companies and enterprises. How serious is this threat?
The results of a security preparedness survey reveal that more than half of organizations aren't ready to defend against online extortion and data breaches.
We looked into the security of kubectl plug-ins in Krew and how supply chains' projects can be at risk.
Exploring the motives behind targeted attacks, and why attacker groups spend so much time, effort, and resources to ensure a successful operation.
Well-designed attacks proceed in six components that show how attackers progress within their targets. Learn about the components that make for a successful campaign to know how to form a proper threat response plan.
The defensive measures companies can take to respond to a targeted attack, from securing sensitive data to intrusion detection and forming an incident response team.
Analysis and insight on targeted attack cases in 2014, with information on state-sponsored attacks and the new tools and techniques used.
For many organizations, the question is no longer if they fall victim to a targeted attack, but when. In such an event, how an organization responds will determine whether it becomes a serious event or if it stays a mere annoyance.
This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.