New phishing malware leverages Artificial Intelligence and worm functionality to rapidly spread to contacts of victims. By leveraging previously established relationships the malware can bypass technical controls and easily fool new targets into bec
New phishing malware leverages Artificial Intelligence and worm functionality to rapidly spread to contacts of victims. By leveraging previously established relationships the malware can bypass technical controls and easily fool new targets into bec
The U.S. Department of Justice filed charges against six Russian agents, identified as members of the APT group known as Sandworm. The unsealed documents reveal that the six suspects are all current or have former ties to the Russian foreign intelli
The U.S. National Security Agency knows which vulnerabilities China backed hackers are exploiting the most to gain access to sensitive data.
The Chinese state-sponsored information gathering engine is a vacuum when it comes to acquiring information fr
Bad news for cryptocurrency criminals!
Cryptocurrency watchers were stunned when they recently saw a billion dollars of Bitcoin being moved from a very old account that has been inactive for years.
The mystery was solved as the U.S. Dept of Justice uns
Even the best security organizations can be hacked! Watch my message to both the cybersecurity industry as well as those attackers that hacked FireEye and stole the RedTeam tools.
This skirmish went to the hackers, but the battle continues.
The cybersecurity industry is consumed with scale and effectiveness of one of the biggest hacks in recent memory. The emerging narrative and stories are missing important pieces of the puzzle. The attackers, likely a nation-state, gained unpreceden
As 2020 comes to a close, we can reflect back on some of the important cybersecurity lessons that are intertwined with the rapidly growing digital cryptocurrency economy.
Some important aspects are changing in law enforcement, when it comes to cybercrime.
In today's video I look at the social aspects within the law enforcement community, the criminal evolution of cybercrime, and the resulting changes in behaviors that
The SolarWinds compromise showed that supply-chain attacks are possible and the ramifications can be tremendously impactful. Other nation states will be investing in efforts to duplicate this success. That makes IT tools, security products, hardware
It appears France is the main victim for this recent attack which has several uncanny similarities to the SolarWinds exploitation that exposed thousands of U.S. government agencies, critical infrastructure organizations, and major businesses. Let me
CISOPlatform Summit: Stronger Together As A Community.
Join us on 30th May, Thursday, Shangri-La at Bangalore
Register Here : https://events.cisoplatform.com/cisoplatform-summit-2024
(Train Your Team) Trainings From Past Blackhat/Defcon/Nullcon Trainers
Register Here : https://event.cisoplatform.com/sacon/