November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,561 hits
Tag Archives: APT
Confessions of a Cyber Spy Hunter
With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, … Continue reading
Posted in Security Blog
Tagged 2013, advanced persistent threat, APT, breach, computer security, cyber risk, cyber warfare, cybercrime, cyberwarfare, hacking, malware, Security Awareness, spy, ted, video tutorial, virus, warfare
Comments Off on Confessions of a Cyber Spy Hunter
1/3 of Wendy’s Locations Compromised
1,025 out of the 3,000 Wendy’s locations had malware on their Point-Of-Sale systems. Investigation has uncovered that infection and exfiltration of credit card information (names, numbers, expiration dates) going back to January of 2015. We believe this series of cybersecurity … Continue reading
Posted in Security Blog
Tagged 2015, 2016, advanced persistent threat, APT, breach, credit card, cybercrime, hacked, malware, PCI Compliance, Security Awareness
Comments Off on 1/3 of Wendy’s Locations Compromised
Top 5 CyberThreats of 2016 To Attack or Defend Against
Depending on what color hat you wear, here are the top cyberthreats that most companies face, according to research. 5. Cross Site Scripting or XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. … Continue reading
Posted in Security Blog
Tagged 2016, advanced persistent threat, application security, APT, behavioral, cross site scripting, cyber risk, hackers, information security, insider threats, personnel risk assessment, pra, Security Awareness, social engineering, sql injection, top 5, xss
Comments Off on Top 5 CyberThreats of 2016 To Attack or Defend Against
Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers
The Turla APT group (we think), who are responsible for the Epic Turla cyber-espionage operation, pushing malware to hundreds of computers in more than 45 countries, have hijacked downstream links from satellites to hide their command and control servers. The … Continue reading
Posted in Security Blog
Tagged 2015, APT, command and control, phishing, satellite, social engineering, Turla, watering hole
Comments Off on Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers