The latter half of 2013 lay witness to two new targeted attack campaigns: BLYPT, which hosts its servers in Romania and Turkey, and Esile, which targets government agencies in APAC to execute remote commands.
With today’s aggressive attack environment, IT security people are indispensible; invaluable with the right tools. So how exactly can organizations take care of their information security personnel? Here are four areas where organizations can help.
Building solid threat intelligence can help organizations spot and mitigate targeted attacks in their early stages. This is why it’s important for enterprises to invest in internal and external intelligence as well as the expertise of reputable security analys
The most immediate security risk to businesses and customers lies in accepting payments through a PoS system. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud.
The lure of money and power is simply irresistible. Opening the Pandora's box of data and information always leads to a pot of gold. Attackers are now see the value of going straight to the source, especially those with low security protocols in place.
A response team could be the only thing standing between a security incident and total disaster. Different from your typical IT team, incident response personnel are tasked to detect and contain network attacks before they escalate to critical levels.
Both threat actors and cybercriminals use the most advanced techniques to boost their attacks’ success rate, including hiding behind legitimate traffic. How can your local IT department catch them when they don’t rouse suspicion?
The EvilGrab campaign—known for targeting governments and diplomatic agencies in China, Japan, and the rest of the world—headlines this quarter’s targeted attack report. Among EvilGrab's many capabilities include grabbing multimedia files and stealing cred
Enterprises are moving towards virtualization and cloud computing. However, adopting these new platforms opens new windows of exposure that can be leveraged in data breach attacks.