Cosmic Lynx takes a sophisticated approach to business email compromise and represents a shift in tactics for Russian cybercriminals.
Read moreCosmic Lynx takes a sophisticated approach to business email compromise and represents a shift in tactics for Russian cybercriminals.
Read moreWe recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that prevented us from producing a fully-deobfuscated memory dump...
Read moreDon't be distracted by flashy advanced attacks and ignore the more mundane ones.
Read moreWe recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that prevented us from producing a fully-deobfuscated memory dump...
Read moreWhy hack into a server when you can just send vistors to a fake alternative instead?
Read moreApplying the 80-20 Rule to Cybersecurity
July 7 2020How security teams can achieve 80% of the benefit for 20% of the work.
Read moreIoT Security Principles
July 7 2020The BSA -- also known as the Software Alliance, formerly the Business Software Alliance (which explains the acronym) -- is an industry lobbying group. They just published "Policy Principles...
Read moreIt's a short jump from a Rolls Royce ride to extradition from the UAE. Goodbye, Dubai, goodbye, Palazzo Versace, hello, Chicago jail cell.
Read moreThe two extraditions of business email compromise attackers indicate a step forward for international law enforcement collaboration.
Read more
Recent Comments