- December 22, 2014South Korean nuclear company, Korea Hydro and Nuclear Power Co (KHNP), became the source of headlines when it fell victim to an attack that resulted in the leak of company information, including employee information and plant blue prints.
- December 16, 2014During a security evaluation of AIS, we found that both the implementation, as well as the protocol specification of AIS, is affected by several threats, from spoofing and hijacking to availability disruption.
- December 08, 2014While Sony recovers from the massive hack, we continue to monitor investigations and developments. Here's a rundown of what happened, what was stolen, who’s being implicated, and tips on how you can defend against likely attacks. [updated]
- December 06, 2014A look into the other WIPALL malware variants that may be linked to the Sony Pictures incident, including a variant that disables the running antivirus application and another that displays a warning message.
- December 05, 2014How did hackers manage to drop a “warning“ wallpaper into Sony Pictures' office computers? With a malware family that we've seen before.
- December 03, 2014Dealing with attacks, intrusions, and data thefts is now a part of doing business for many organizations. The recent attack on Sony Pictures highlights the importance of proper incident response.
- December 01, 2014The United States Industrial Control System Cyber Emergency Response Team recently released an advisory warning operators of industrial control systems that there is an active cyber crime campaign targeting them with Trojans and backdoor attacks.
- November 25, 2014Reports have implicated a sophisticated piece of malware known as Regin that has been in use for years. Designed to carry out long-term stealthy surveillance on would-be victims, telecom companies are believed to have been its primary targets.
- November 21, 2014Backdoors are applications that open computers to remote access, and are used as a way to avoid detection and carry out targeted attacks. How can IT administrators secure their networks against these backdoor techniques?