The effort is related to ongoing Operation Lotus Blossom attack campaigns in the Asia Pacific region.
National Cyber Security Strategy Aims to Defend, Deter, Develop
Chancellor Philip Hammond has launched the new UK cybersecurity strategy, built on developing future talent, protecting what we have and identifying the malicious few.
Firms Value Threat Intel … But Fail to Use it Properly
Anomali survey finds organizations are suffering from data overload
NHS Trust Suspends Operations After Major Cyber Incident
Patients transferred after IT systems are shut down
Toolsmith – GSE Edition: snapshot.ps1
I just spent a fair bit of time preparing to take the GIAC Security Expert exam as part of the requirement to recertify every four years. I first took the exam in 2012, and I will tell you, for me, one third of the curriculum is a “use it or lose it” s…
Trend Micro: Fake Apple iOS Apps Are Rampant
The Apple iOS environment is riddled with malicious fake apps, signed with enterprise certificates.
IoT Control Wins Trusted Environment Hackathon
SafeHaven, a system for granular control of IoT devices in smart homes, has won Trusted Execution Environment (TEE) hackathon.
5 Reasons Trump Might Not Increase Defense Spending
Loren Thompson, TNI Donald Trump is so forceful in his public presence and pronouncements that many observers simply assume he would be a decisive commander in chief. However, being decisive…
Cyberbit Range Offers Simulated Attack Training
The Cyberbit Range provides lifelike simulation for security operations trainees—kind of like the holodeck, in Star Trek.
Converse E-Commerce Site Hacked for Payment Info
The Australian online site for the iconic sneaker brand was compromised for more than a month.