A couple of weeks ago, we were approached (independently) by two blind security enthusiasts who both drew our attention to the fact that Kali Linux had no built-in accessibility features. This made Kali difficult, if not impossible, to both install and…
Privileged account compromise behind 100% of recent large-scale APT attacks
Privileged accounts with insufficient security is a prime vector for targeted cyber-attacks, leading to theft, misuse and exploitation, and their compromise is becoming a key tactic in each phase of an advanced persistent threat (APT) attack cycle.
Infosecurity Europe 2013: Infosec can no longer hinder business objectives
CISOs need to change their approach if they are to make their voice heard
Verizon: Financial malware, state-sponsored hacking dominated 2012 data breaches
Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, taking top (dis)honors for being behind the most breaches during the year.
Infosecurity Europe 2013: Analysts scan the threat horizon
Hacktivism and espionage are poised for growth, but cyberthreats will continue to follow the money.
Infosecurity Europe 2013: Small firms in cybercriminals’ sights
More small firms are the victims of cyber attacks, and the cost of breaches is rising across the board, according to a PwC-BIS survey.
IPS needs to become more aware of advanced evasion techniques
Advanced evasion techniques (AETs) rarely receive the full publicity they deserve – possibly because it is a term originally coined by one manufacturer (Stonesoft) to describe how attackers defeat other security manufacturers.
Infosecurity Europe 2013: Minister puts infosecurity at heart of UK growth strategy
Chloe Smith, Minister for Political and Constitutional Reform, opens Infosecurity Europe 2013
Twitter for news and malware: threats spreading through malicious tweets
With 288 million active users, Twitter has proven itself over and over to be a fantastic tool for spreading information and acting as a news source, especially in times of crisis.
Fresh Operation Beebus attack targets military drone technology
Attack on the drones? A dozen organizations in aerospace, defense, telecom and government agencies located in the US and India are the target of an Operation Beebus campaign that goes back to at least as early as December of 2011.