• May 19, 2014
    The latter half of 2013 lay witness to two new targeted attack campaigns: BLYPT, which hosts its servers in Romania and Turkey, and Esile, which targets government agencies in APAC to execute remote commands.
  • April 18, 2014
    With today’s aggressive attack environment, IT security people are indispensible; invaluable with the right tools. So how exactly can organizations take care of their information security personnel? Here are four areas where organizations can help.
  • March 10, 2014
    Building solid threat intelligence can help organizations spot and mitigate targeted attacks in their early stages. This is why it’s important for enterprises to invest in internal and external intelligence as well as the expertise of reputable security analys
  • February 17, 2014
    The most immediate security risk to businesses and customers lies in accepting payments through a PoS system. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud.
  • February 16, 2014
    The lure of money and power is simply irresistible. Opening the Pandora's box of data and information always leads to a pot of gold. Attackers are now see the value of going straight to the source, especially those with low security protocols in place.
  • January 31, 2014
    A response team could be the only thing standing between a security incident and total disaster. Different from your typical IT team, incident response personnel are tasked to detect and contain network attacks before they escalate to critical levels.
  • December 05, 2013
    Both threat actors and cybercriminals use the most advanced techniques to boost their attacks’ success rate, including hiding behind legitimate traffic. How can your local IT department catch them when they don’t rouse suspicion?
  • September 19, 2013
    The EvilGrab campaign—known for targeting governments and diplomatic agencies in China, Japan, and the rest of the world—headlines this quarter’s targeted attack report. Among EvilGrab's many capabilities include grabbing multimedia files and stealing cred
  • July 17, 2013
    Enterprises are moving towards virtualization and cloud computing. However, adopting these new platforms opens new windows of exposure that can be leveraged in data breach attacks.