A group of Hungarian researchers found that the National Security Agency (NSA) was able to scan for and track nation-state threat groups when NSA workers were conducting operations inside other country's systems.
Healthcare is the only industry in which internal threat actors are the biggest threat to an organisation, a recent study posits.
Some 78 percent of organisations polled The Thales 2018 Data Threat Report plan on increasing their IT security spending in 2018, up from 73 percent globally in 2017, and including nearly 86 percent of US organisations.
Even with a layered defence in place, it cannot be left to stagnate as the nature of threats will change over time and older defences may not be designed to combat new attacks.
Cyber-attacks on critical infrastructure are now the biggest threat to humanity and more action and collaboration is needed to defeat nation state actors and terrorists threatening essential systems.
The malicious actors behind Scarab ransomware have rolled out a new variant, one that uses a different distribution method and ransom threat in order to infect computers and ensure payment.
A ransomware threat called GandCrab emerged during the last week of January, which itself not that newsworthy. However, it's distribution method and ransom currency choice could be pointers to how 2018 ransomware will evolve.
Security researchers recently observed an unknown threat actor attempting to deploy a Monero cryptocurrency miner software to users' systems by leveraging Kaseya Ltd's Virtual Systems Administrator (VSA).
Attackers continue to consider email an attractive attack vector and this highlights the stresses that security pros face daily trying to sort through threats.
A new Kaspersky Lab report states that the company's threat detection technologies identified an average of 360,000 malicious files per day in 2017, an 11.5 percent increase over the previous year, and a five-fold increase since 2011.
A malspam campaign targeting several Balkan countries is distributing a new ransomware called File Spider that threatens to delete a victim's files if the ransom is not paid within 96 hours.
Researchers with ClearSky Cyber Security believe with medium-level confidence that they've linked three individuals to the Iranian advanced persistent threat group Charming Kitten, including the man accused of hacking HBO.
Cyber threats are evolving quickly. Fortunately, so is incident detection and response (IDR), powered by data explains Eric Sun, with techniques such as honeypots identifying suspect behaviour.
When it comes to cyber-security, the problem is that while businesses and IT leaders are prioritising cyber-security investment, the investment in that security has always been responsive, rather than preventative says Steve Inglessis.
In Case You Missed It: UK threat grows says NCSC, TalkTalk customers report fraud calls, HSBC customers being phished, NHS Wales breached, and the latest Web browser exploits.
Stephanie Forrest discusses the parallels between computer viruses and biology and how our understanding of them is informing cyber-security.
Jason Hart discusses how data manipulation will be the biggest threat to businesses and public figures in the future
Operational intelligence firm Splunk describes 'full lifecycle' of attacks and advocates analytics-driven security
Iran Chief Brigadier General Kamal Hadianfar said at a Monday press conference that the person spreading the rumor that Daesh might poses a cyber-threat to Iran has been identified and admonished by FATA.
A report from Tech UK says that tackling cyber-crime in the UK needs better funding distribution, a police Managed Service Provider to contract skills more easily and more accurate reporting.
Cyber-security has become a boardroom issue, but too few boards give the topic the time or resources required, our experts agreed at a recent SC Magazine Roundtable. Opinions were split over how to respond
Utilities face thousands of cyber-attacks every day, but we are not prepared for a successful take-down despite the very real threat says Oliver Eckel
MI5 has issued a warning to British corporate chiefs that foreign spy agencies are targeting IT staff within big businesses, grooming them to gain access to highly valuable, corporate information according to an FT report.
Thieves and employees take assets off the network to avoid tracking
Drive-by downloads are stealthy in nature and very difficult to prevent.
One of the hot topics at the Infosecurity Europe show - held in London this week - is the scale and complexity of the latest attacks against corporates.
Systems admins are being warned of a "potentially disastrous" security flaw that allows hackers to steal data from millions of websites worldwide without leaving a trace.
FireEye taps its IPO cash pile to acquire data forensics specialist.
The use of the term 'cyber Pearl Harbor' has been slammed by Art Coviello, executive vice president of EMC and executive chairman of RSA, who said that he 'hated' the term.
The old security model is doing an 'okay job' when it comes to preventing targeted attacks and advanced persistent threats (APTs), according to an industry expert.