Reports

Thamar Reservoir – Iranian hackers target entities in Middle EastThamar Reservoir – Iranian hackers target entities in Middle East

Thamar Reservoir – Iranian hackers target entities in Middle East

Security experts at ClearSky have published a report on the a cyber espionage campaign dubbed Thamar Reservoir that is targeting…

10 years ago
APWG Global Phishing Survey – Registered malicious domains increased in H2 2014APWG Global Phishing Survey – Registered malicious domains increased in H2 2014

APWG Global Phishing Survey – Registered malicious domains increased in H2 2014

The APWG Global Phishing Survey 2H2014 seeks to understand what the phishers are doing, and how, by quantifying the scope…

10 years ago
Security Affairs newsletter Round 11 – Best of the week from best sourcesSecurity Affairs newsletter Round 11 – Best of the week from best sources

Security Affairs newsletter Round 11 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago
Ponemon Institute – Cost of data breach reaches record levelsPonemon Institute – Cost of data breach reaches record levels

Ponemon Institute – Cost of data breach reaches record levels

The Ponemon Institute's 2015 Global Cost of Data Breach Study reveals that the average cost of a data breach has…

10 years ago
Linux-based Moose worm turns routers into social network botsLinux-based Moose worm turns routers into social network bots

Linux-based Moose worm turns routers into social network bots

Linux/Moose is a malware family that targets Linux-based consumer routers turning them into social network bots to use for illegal…

10 years ago
Frustrating Revelations about Zero-Day Threats and Their Lack of Detection for 2 Whole MonthsFrustrating Revelations about Zero-Day Threats and Their Lack of Detection for 2 Whole Months

Frustrating Revelations about Zero-Day Threats and Their Lack of Detection for 2 Whole Months

The recent report from ISTR has outlined the fact that zero-day vulnerabilities remain unresolved for 59 days. What you can…

10 years ago
Who and why is attacking companies in the Nordic Countries?Who and why is attacking companies in the Nordic Countries?

Who and why is attacking companies in the Nordic Countries?

Security experts at FireEye have published a report that details the cyber threats targeting various sectors in the Nordic countries.…

10 years ago
DDoS Attacks on the rise in Q1 2015, says AkamaiDDoS Attacks on the rise in Q1 2015, says Akamai

DDoS Attacks on the rise in Q1 2015, says Akamai

DDoS attacks even more dangerous according to the last report published by Akamai Technologies, the "Q1 2015 State of the…

10 years ago
Retailers take 197 Days on Average to Identify Security BreachesRetailers take 197 Days on Average to Identify Security Breaches

Retailers take 197 Days on Average to Identify Security Breaches

A new report published by Arbor Networks and the Ponemon Institute explains how Financial Service and Retail Organizations tackle advanced…

10 years ago
New Intel Security study shows that 97% of people can’t identify phishing emailsNew Intel Security study shows that 97% of people can’t identify phishing emails

New Intel Security study shows that 97% of people can’t identify phishing emails

Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect…

10 years ago