Filter
Type
Categories
    • Application Security ()
    • Cloud Security ()
    • Endpoint Security ()
    • Identity & Access Management ()
    • Infrastructure Security ()
    • Risk Management & Compliance ()
    • Security Operations & Incident Response ()
    • Threat Intelligence & Vulnerability Management ()
    • Defence, Intelligence & Law Enforcement ()

14.07.2020 | News | Check Point

SIGRed, not just another Microsoft vulnerability

Microsoft patched a wormable hole in its Windows Server software that can be exploited remotely to completely commandeer the machine …
Microsoft Windows Server vulnerabilities

05.06.2020 | Blog |

Unilever CISO on Security Priorities for Remote Workforce

Bobby Ford, CISO of Unilever, a multinational consumer goods firm, says the shift to a work-from-home environment requires an intensified …
Email Protection Remote working COVID-19, Corona

23.05.2020 | News | Positive Technologies

Darkweb market packed with offers to purchase access to corporate networks

Positive Technologies experts have analysed illegal marketplaces on the dark web and found a flood of interest in accessing corporate networks. In …
Ransomware protection Dark web monitoring

14.05.2020 | Blog | Security Academy

Using the Dark Web for Threat Intelligence

The Dark Web is a mysterious and controversial place. Due to frequent negative news, it is primarily perceived as a …
Dark web monitoring

10.05.2020 | Blog | Security Academy

SOC Analyst Burnout – Problem and the Solution

It is a widely known fact that the cybersecurity industry is experiencing an immense skills shortage. A recent study by ENISA …
SIEM Security Orchestration SOC- Services SOAR Security Orchestration Incident Response

09.05.2020 | Blog | LSEC

Bart Preneel on Corona Apps and Privacy

The attention to personal tracing technologies has suddenly boomed as a result of the current CORONA-crisis.  Both existing and new technologies are being …
Data Privacy

30.04.2020 | News | Cybereason

Eventbot, a new mobile banking Trojan

Cybereason Nocturnus team has identified a new type of Android mobile that targets users of over 200 different financial applications, …
android application security Malware detection Mobile malware Mobile forensics EventBot malware Infostealer

22.04.2020 | News | RACK911 Labs

Rack911: Easy to manipulate antivirus software into self-destructive tools

RACK911 Labs has come up with a unique but simple method of using directory junctions (Windows) and symlinks (macOS & …
Vulnerability Management

21.04.2020 | News | Microsoft

TrickBot Malware doubtful winner in COVID-19 Phishing Campaigns

Based on Office 365 ATP data, Trickbot is the most prolific malware operation using COVID-19 themed lures. This week’s campaign …
Spear Phishing TrickBot malware Emotet malware Ryuk malware

20.04.2020 | News | Cyble

267 Million Facebook User Records for Sale on Dark Net

Millions of Facebook user IDs and other user information is being offered for sale on the darkweb, according to cybersecurity intelligence …
API Security Dark web monitoring

19.04.2020 | News | Aspen Institute Cyber Security Group

Nation state hackers running espionage against Coronavirus medical research organizations

Nation-state hackers have been running cyber-espionage operations against medical research organizations in the U.S. that are studying the novel coronavirus, …
Industrial Espionage COVID-19, Corona

18.04.2020 | News |

Cognizant confirms Maze ransomware attack

To this day, details provided by the Tech Giant are limited to a very short statement on its site, confirming …
Ransomware protection Maze ransomware

17.04.2020 | News |

Czech Cyber Security Center warns for targeted attacks on hospitals

The Czech National Cyber and Information Security Agency (NUKIB) has issued a warning against a cybersecurity threat in the form …
Ransomware protection COVID-19, Corona

15.04.2020 | News | Kaspersky

Free workshop Threat Hunting with Yara from Kaspersky

March 31, Costin Raiu, director of Kaspersky’s Global Research and Analysis Team (GReAT), shared his best practices on the use of …

14.04.2020 | News |

Dutch police shuts down 15 DDoS service providers in a week

Dutch authorities took down 15 DDoS-for-hire services (also known as DDoS booters, or DDoS stressors) as part of the operation …
DDoS attack protection / Botnet Protection

11.04.2020 | News | Chaos Computer Club

Chaos Computer Club lists 10 requirements for Corona Tracking App

Europe's largest association of hackers, the Chaos Computer Club (CCC) has published a set of minimum requirements  for "Contact Tracing" …
Data Privacy COVID-19, Corona

10.04.2020 | News | Bitdefender

New IoT Botnet Dark Nexus puts other botnets to shame

Bitdefender researchers have found a new IoT botnet with new features and capabilities that put to shame most IoT botnets …
DDoS attack protection / Botnet Protection IoT Botnets - Internet of Things Mirai, Qbot, Dark Nexus Botnets

09.04.2020 | News | ForgeRock

ForgeRock Appoints New Chief Technology Officer

SAN FRANCISCO – April 9, 2020 - ForgeRock®, the leading provider in digital identity, today announced the appointment of Eve Maler as …

08.04.2020 | Blog | FireEye

Mandiant: Zero days exploitations largely facilitated by private companies

FireEye Mandiant Threat Intelligence documented more zero-days exploited in 2019 than any of the previous three years. While not every …

07.04.2020 | News | INTERPOL

INTERPOL warns for Ransomware attacks on hospitals

INTERPOL has issued a warning to organizations at the forefront of the global response to the COVID-19 outbreak that have …
Ransomware protection COVID-19, Corona

07.04.2020 | News | Accenture

Accenture Acquires Revolutionary Security

NEW YORK; April 7, 2020 – Accenture (NYSE: ACN) has acquired Revolutionary Security, a privately held company specializing in enterprise …
SCADA/ICS Security Industrial Automation Security ICS Penetration Testing / Industrial Control Systems Penetration Testing

06.04.2020 | News | Rapid7

80 % of Exchange servers vulnerable to attack

The Rapid7 research team has found that more than 350,000 Exchange Servers lack a critical patch that could allow a …

06.04.2020 | News | Trend Micro

Trend Micro 2019 Google Cloud Technology Partner of the Year for Security

DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced that it has been awarded as …

05.04.2020 | News | Fortinet

Spearphishing with the WHO trademark

FortiGuard Labs recently discovered a new COVID-19/Coronavirus-themed spearphishing email sent from [159.69.16[.]177] that uses the World Health Organization (WHO) trademark …
Spear Phishing TrickBot malware COVID-19, Corona

04.04.2020 | Blog | nviso

To Zoom or Not to Zoom

During these COVID-19 times, personal interaction with colleagues and customers is no longer straightforward. Lots of companies are therefore looking …
Eavesdropping and phone tapping Insider Threat Security Awareness Training COVID-19, Corona

03.04.2020 | News | OWASP

OWASP launches IoTGoat to educate IoT devices security

Today, OWASP announced the official release of IoTGoat; a deliberately insecure firmware created to educate software developers and security professionals …
IoT Devices security / Internet of Things

02.04.2020 | News | ENISA

ENISA publishes Roadmap cooperation CSIRTS and Law Enforcement

ENISA today published its roadmap CSIRTS and Law Enforcement. The purpose of this roadmap is to further explore the cooperation …
Incident Response as a Service (CSIRT) Threat Intelligence Sharing

02.04.2020 | News |

Dutch tax agency FIOD and TU Delft join forces in investigating digital and financial crime

TU Delft (University of Delft) researchers and students are helping the FIOD (Fiscal Information and Investigation Service) in its efforts …
Financial Economic Crime (FEC) Dark web monitoring

01.04.2020 | News | Global Cyber Alliance (GCA)

13 Non Profits join forces to protect remote working

The Global Cyber Alliance is one of 13 nonprofit organizations that have banded together to help businesses secure their newly …
Insider Threat Ransomware protection Spear Phishing COVID-19, Corona

01.04.2020 | News |

COVID-19 CTI League launched to neutralize Corona related actors and attacks

A worldwide group of volunteering CTI experts, Incident responders and Industry experts have joined forces to identify, analyze and neutralize …
Cyber Threat Intelligence - CTI Threat Intelligence Sharing COVID-19, Corona

01.04.2020 | News | GuardiCore

Microsoft SQL Servers under attack

Guardicore Labs uncovered a long-running attack campaign which aims to infect Windows machines running MS-SQL servers. Dating back to May …
Brute force attacks Cryptomining attacks

30.03.2020 | Blog | Excellium Services

Deception technology explained

The term Deception technology might be unknown or obscure to you, and that is perfectly normal considering it refers to one of …
Honeypots

29.03.2020 | News | EclecticIQ

EclecticIQ’s new browser extension helps analysts capture threat indicators automatically

EclecticIQ, global provider of cyber threat intelligence (CTI) technology solutions, has released a new browser extension, specifically made for its …
Cyber Threat Intelligence - CTI

27.03.2020 | News | ProtonMail

Vulnerability in iOS 13.3.1 prevents VPNs from encrypting all traffic

A member of the Proton community discovered that in iOS version 13.3.1, the operating system does not close existing connections …
Apple iOS application security

26.03.2020 | News | Kentik

How Zoom, Netflix, and Dropbox are Staying Online During the Pandemic

To fight the COVID-19 pandemic, huge swaths of humanity have transformed their daily routines. Offices and schools are closed, city …

26.03.2020 | News | ENISA

ENISA launches platform European Cybersecurity studies

As part of its effort “Cybersecurity Skills Development in the EU”, ENISA has today launched its Cybersecurity Higher Education Database. The database lists …

25.03.2020 | Blog | Bitdefender

New Brute-Force Attack Aims at Home Routers as More People Work Remotely

Bitdefender researchers have recently found a new attack that targets home routers and changes their DNS settings to redirect victims …
Brute force attacks

20.03.2020 | Blog | Tor Project

Tor Project shares tools it uses for remote working

The world's strongest tool and non -profit initiative for internet privacy and freedom online has revealed some of the tools …
Data Privacy

17.03.2020 | News | The Shadowserver Foundation

Shadowserver urgent request for financial support to sustain US operations

The Shadowserver Foundation, the volunteer watchdog group engaged in combatting malware, botnet activity and electronic fraud has lost founding from …
DDoS attack protection / Botnet Protection

16.03.2020 | News | DomainTools

Mobile Coronavirus Tracking App Coughs Up Ransomware

Cybercriminals like to exploit people when they are at their most vulnerable. They use dramatic events that cause people to …
Mobile malware

13.03.2020 | News | Cyber Butler

First meeting of cyber triangle in the Netherlands

Since yesterday, the Netherlands has its first "cyber triangle". Katwijk’s Mayor, Cornelis Visser (also regional cybercrime portfolio holder), police chief …
Cybercrime

12.03.2020 | News | Siemens

Siemens publishes Incident Response Playbook for Energy Infrastructure

Leo Simonovich, the Global Head of Industrial Cybersecurity at Siemens Energy introduced a Playbook for Incident Response for Energy infrastructures. …
SCADA/ICS Security Industrial Automation Security

12.03.2020 | News | Europol Cybercrime Centre (EC3)

Dark Web Child Abuse: Administrator of Darkscandals arrested in the Netherlands

In an international case, the Dutch Police (Politie), the Dutch Fiscal Intelligence and Investigation Service (FIOD), Dutch National Prosecutor’s office …
Dark web monitoring

11.03.2020 | News | Cyber Butler

Avast disables part of its antivirus product to prevent remote code execution

Avast this week disabled a JavaScript interpreter that is part of its antivirus product, after security researcher Tavis Ormandy from …

10.03.2020 | News | Trend Micro

Trend Micro Cloud App Security Report 2019

Trend Micro today published its Cloud App Security Report 2019. Cloud App Security detected and blocked 12.7 million high-risk threats that …
Cloud Application Security

10.03.2020 | News | Cyber Butler

Vermont sues web-scraping facial recognition firm Clearview

MONTPELIER, Vt. (AP) — The state of Vermont is suing a data broker that it says uses facial recognition technology …
Data Privacy

09.03.2020 | News | WatchGuard Technologies

WatchGuard acquires Panda Security

WatchGuard Technologies today announced that it has entered into a definitive agreement to acquire Panda Security. The combined entity will provide centralized …
2-factor authentication network security Endpoint Discovery

09.03.2020 | News | Cyber Butler

Dutch DPA warns for algorithms that lead to exclusion and discrimination

On his privacyblog, Aleid Wolfsen, the Ducth Data Protection Authority warns for algorithms that lead to exclusion and discrimination. 
Data Privacy GDPR

09.03.2020 | News | Cyber Butler

Malware Campaign exploits Corona Virus using AZORult

Reason Labs’ cybersecurity researcher, Shai Alfasi, found and investigated malware that disguised as a “Coronavirus map". These  weaponized coronavirus map …
Spear Phishing

05.03.2020 | Blog | Microsoft

Ransomware attacks are a preventable disaster

In its blog, the Microsoft Threat Protection Intelligence Team elaborates on its research on well-known human-operated ransomware campaigns [like REvil, …
Ransomware protection

04.03.2020 | News | Core Security a HelpSystems Company

HelpSystems Acquires Cobalt Strike

MINNEAPOLIS, March 04, 2020 (GLOBE NEWSWIRE) -- HelpSystems announced today the acquisition of Cobalt Strike, a leading penetration testing (pen-testing) …
Bug Bounty Penetration Testing

25.02.2020 | News | Fortinet

Fortinet Introduces AI Appliance for Threat Detection

Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced FortiAI, an on-premises appliance that leverages …
Artificial Intelligence Cyber Threat Intelligence - CTI Intrusion detection and prevention systems - IDS, IPS Deep learning neural networks

20.02.2020 | News | Cyber Butler

Manufacturers lax with smart device safety

Smart device manufacturers do not pay enough attention to the safety of their products. That’s the conclusion from the Dutch …
IoT Devices security / Internet of Things

04.02.2020 | Blog | EclecticIQ

2019 Threat Intelligence Trends and 2020 Predictions

In this blog post we are looking at the top trends and patterns that EclecticIQ Fusion Center analysts identified throughout 2019. The …
Cyber Threat Intelligence - CTI

28.01.2020 | News | Atos Cyber Security

ATOS and Palo Alto introduce Cloud Security Posture Management service

Atos, a global leader in digital transformation, launches a new Cloud Security Posture Management (CSPM) service powered by Palo Alto Networks Prisma™ Cloud technology. …
Data Protection in the Cloud Data Compliance in the Cloud

21.01.2020 | News | FireEye

FireEye Acquires Cloudvisory

FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today announced the acquisition of Cloudvisory. The acquisition, which closed on January 17, 2020, will …
Cloud Data Protection Data Protection in the Cloud

16.01.2020 | Blog | SentinelOne

What is the true cost of a ransomware attack? 6 factors to consider

The end of year summary season is gone, and among all the scary and shocking statistics, there is one number that looms …
Ransomware protection

14.01.2020 | Blog | SentinelOne

History of cyber attacks from Iran and Mitigation Actions against future attacks

The recently heightened tensions between the United States and Iran have resulted in an increased focus on Iran’s cyber-capabilities. With …
Cybercrime State sponsored attacks

13.01.2020 | Blog | SentinelOne

Top-Tier Russian Organized Cybercrime Group Unveils Fileless Stealthy “PowerTrick” Backdoor for High-Value Targets

The TrickBot cybercrime enterprise actively develops many of its offensive tools such as “PowerTrick” that are leveraged for stealthiness, persistence, …
APT and zero day threats Cybercrime Indicators of Exposure (IOE) TrickBot malware

01.01.2020 | Blog | Deloitte Enterprise Risk Services

Report: Managing cyber risk in the electric power sector

The power sector is one of the most frequently targeted and first to respond to cyber threats with mandatory controls. …
SCADA/ICS Security Industrial Automation Security critical infrastructure protection

01.01.2020 | Blog | Intigriti

Bug Bytes 51 – ArneSwinnen’s secrets, Hunting in the Dark & OSINT movie picks

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week. Bug Bytes is a weekly newsletter …
APT and zero day threats Bug Bounty Penetration Testing

31.12.2019 | Blog | ATAR Labs

Does your Security Operations need SOAR?

Security Operation Center (SOC) units are facing a fundamental set of challenges; unprecedented hand-operated workload, a growing number of security …
Security Orchestration SOAR Security Orchestration Incident Response

26.12.2019 | Blog | Fortinet

Addressing Top SD-WAN Security Concerns

For many networking teams, making the move to SD-WAN is an easy decision, especially considering the support it offers for new critical …
SD-WAN Security

19.12.2019 | Blog | G DATA

G DATA IT Security Trends 2020: Early detection and repulsion of dangerous attacks

Medium-sized companies are being targeted even more heavily by cyber criminals than before. They are often the weakest link in …
Ransomware protection Mobile malware

11.12.2019 | News | SentinelOne

SentinelOne launches new Research Division

SentinelOne, the autonomous endpoint protection company, today announced the launch of SentinelLabs, a research division designed to identify new attack vectors and mitigate …
Cyber Threat Intelligence - CTI

10.12.2019 | News | BAE Systems

BAE Systems to develop new cyber tools for US Defense

BAE Systems has been awarded a contract by the U.S. Defense Advanced Research Projects Agency (DARPA) to develop new cyber …
Vulnerability Management

04.12.2019 | Blog | Atos Cyber Security

Security by design: the new cyber security paradigm

We are living in remarkable times as ongoing digitalization transforms the world in which we live. It is estimated that …
Security by design

01.12.2019 | Blog | Excellium Services

OSINT: Open Source Intelligence

The world of intelligence assessment is divided into multiple parts. For example, the SIGINT, or signal intelligence is the fact …
Cyber Threat Intelligence - CTI OSINT- open source intelligence

28.11.2019 | Blog | Mailfence

Open Letter regarding Commission’s “e-evidence” proposal

The Commission is considering to put a new legislation in effect that strips off the competitive advantage of European tech …
e-evidence

07.11.2019 | Blog | Fortinet

Disrupting Cybercriminal Strategy With AI and Automation

In the cybersecurity space, there has always been an unfair advantage for cybercriminals. Adversaries only need to find one vulnerability …
Artificial Intelligence Deep learning neural networks

31.10.2019 | Blog | Excellium Services

Office 365, Azure Active Directory and the Incident Response

Microsoft is the de facto leader when it comes to the enterprise infrastructure. Recently, we have seen an increasing number …
Cloud Data Protection Incident Response Management Office 365 Security Microsoft Azure Security

23.09.2019 | Blog | InWebo

When to merge IAM and MFA

Identity & Access Management (IAM) is employed by organizations to manage user identities and permissions related to resources, processes, and …
2-factor authentication Identity & Access Management (IAM)

20.09.2019 | Blog | KPMG Technology Advisory

Changing attitudes about cyber security

According to the recent KPMG / Harvey Nash CIO survey, increased investments in cyber security are leading to greater confidence in …
GRC Consulting / Governance, Risk & Compliance Consulting

16.09.2019 | Blog | Excellium Services

Content Security Policy header to prevent Cross Site Scripting Attacks

Since the web 2.0, website use more code and resources on client side. This is due to the large number …
OWASP top 10 protection Cross Site Scripting XSS Attacks

15.09.2019 | Blog | CSI tools

Security risks of Robotic Processing Automation (RPA) in SAP

Nowadays we see an increase in Robotic Processing Automation (RPA). RPA is based on executing automated scripts, by software bots. …
SAP Access Governance SAP Audit & Security SAP Governance (SAP GRC) SAP Roles and Profiles

03.05.2019 | Blog | Deloitte Enterprise Risk Services

The ascent of the CISO: Cyber everywhere. Succeed anywhere.

The chief information security officer (CISO) of the present is a different breed from that of the past. It has …

18.04.2019 | Blog | Atos Cyber Security

Prescriptive security: using the haystack to find the needle

In our increasingly data-driven world, organizations are engaged in a race to gather operational and customer data and apply analytics …
SOC- Services

02.02.2019 | Blog | KPMG Technology Advisory

Ten trends driving cyber security in 2019

The KPMG cyber team highlights ten cyber security trends we can expect to see in 2019.
Artificial Intelligence Cybercrime Financial Fraud Vendor Risk Management

15.03.2018 | Blog | Toreon

Embedding GDPR in the secure development lifecycle (SDLC)

Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the …
GDPR Compliance Tooling Secure Software Development Life Cycle (SDLC)

27.02.2018 | Blog | FireEye

Building a Mature Cyber Threat Intelligence Program

The concept of becoming intelligence-led is greater than only consuming threat data and correlating indicators within your tools. A mature …
Cyber Threat Intelligence - CTI

26.02.2018 | Blog | DutchSec

The Art of Cyber Defense: Security by Deception

I’m sure many security professionals are familiar with The Art of War by Sun Tzu. This book, dating from the …
Proactive Web Defence Honeypots

23.02.2018 | Blog | FireEye

Preparing for an Incident Response

The need to conduct an incident response (IR) can strike at any time, and there are many steps that an organization can …
Asset Discovery Incident Response Management Cyber Security simulation & defense exercises

22.02.2018 | Blog | SecurityMatters, A Forescout Company

4 Malware lessons learned from 2017

While 2018 is still fresh, let's take some time to reflect on a few critical pieces of malware that impacted …
SCADA/ICS Security Industrial Automation Security anomaly detection APT and zero day threats Red Teaming Deep File Inspection, Deep Packet Inspection

21.02.2018 | Blog | Redsocks [ now Bitdefender ]

17 Threat Landscape Predictions for 2018

Every day we work towards a better and safer future, but to do so, we need to understand what we …
behavioral threat detection APT and zero day threats DDoS attack protection / Botnet Protection Ransomware protection Spear Phishing Malware detection Mobile malware IoT Botnets - Internet of Things

19.02.2018 | Blog | Secudea

Remote Management for ICS Environments

Having a centralized, time based, source IP controlled, strong authenticated, monitored and logged solution is good and secure – but …
SCADA/ICS Security SCADA secure webaccess Industrial Automation Security critical infrastructure protection

16.02.2018 | Blog | SecurityMatters, A Forescout Company

3 Reasons why to monitor your ICS Network

Industrial Control System (ICS) networks play a major role in keeping the citizens and infrastructure of a country safe and …
SCADA/ICS Security Industrial Automation Security critical infrastructure protection

15.02.2018 | Blog | FireEye

Best Defense Against Spear Phishing

Spear phishing is a very simple, yet targeted and dangerous email-based cyber attack. You’ve probably seen a spear-phishing email before: ' …
Secure Email Email Protection Spear Phishing

03.02.2018 | Blog | IBM Security Services

Solid Identity and Access management in a world ruled by cloud and mobile

A more connected world has given rise to an open economy, powered by cloud and mobile technology. Looser, more temporary …
Cloud Secure Access Cloud Access Control Identity & Access Management (IAM)