Archive for November, 2016

Do You Need a Threat Intelligence Team?

Monday, 21 November, 2016 | X

I have the great opportunity to spend time with CSOs and IT executives to understand their cybersecurity concerns and help…

What Makes a Good Exploit Kit

Thursday, 17 November, 2016 | X

Exploit kits, pre-packaged software that uses vulnerabilities in software applications to spread malware, are not new to the information security…

image

Cybercriminals on the Outlook for Your Emails

Monday, 15 October, 2018 In Featured News, General News, Top News

According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since…

Web Isolation Firm Garrison Technologies Raises $30 Million

Monday, 15 October, 2018 In Featured News, General News

London, UK-based Garrison Technologies has raised £22.9 million (approximately $30 million) in Series B funding, bringing the total raised £34.9…

UK, US Security Agencies Deny Investigating Chinese Spy Chips

Monday, 8 October, 2018 In General News, Top News

The U.S. Department of Homeland Security (DHS) and the U.K. National Cyber Security Centre (NCSC) have denied investigating the presence…

Silk Road Admin Pleads Guilty

Monday, 8 October, 2018 In Featured News, General News

An Irish man pled guilty in a United States court to his role in the administration of Silk Road, a…

7 Most Prevalent Phishing Subject Lines

Friday, 28 September, 2018 In General News, Hacker Zone, Other News

The most popular subject lines crafted to trick targets into opening malicious messages, gleaned from thousands of phishing emails. 1…

image
Latest Videos
Polls
Sorry no Polls available - check back soon