Expand your cloud expertise: Discount on CCSP training

Challenging times call for exceptional measures. And (ISC)² is committed to helping you keep your Certified Cloud Security Professional (CCSP) certification goals on track this year. (ISC)² is bringing back special pricing on flexible CCSP exam prep so… Continue reading Expand your cloud expertise: Discount on CCSP training

There’s CISSP training, then there’s official CISSP training

The CISSP is the most highly regarded certification in the cybersecurity industry, so it isn’t surprising that countless training companies offer CISSP exam prep. But you wouldn’t trust your personal fitness to just anyone wearing a track suit. The sam… Continue reading There’s CISSP training, then there’s official CISSP training

Kingminer Botnet Keeps up with the Times

The e-currency boom in late 2017 sparked a new type of “gold rush”, as cyber-criminals started racing to infect home computers and data centers with crypto-miners. While digital currencies have fluctuated wildly since late 2017, cyber-crimi… Continue reading Kingminer Botnet Keeps up with the Times

StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure

Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&C infrastructure to thwart forensic investig… Continue reading StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure

Guide: How to assess your email vulnerability for free in 20 minutes

Attacks delivered via email are extremely common and the fact is that many popular security solutions are just not handling these attacks well enough, missing 20-40% of the new attacks emerging every day. What makes this issue even more urgent is that … Continue reading Guide: How to assess your email vulnerability for free in 20 minutes

BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool

In 2016, a sophisticated malware campaign targeting Pakistani nationals made headlines. Dubbed Bitter, the Advanced Persistent Threat group (also known as APT-C-08) has been active both in desktop and mobile malware campaigns for quite a long time, as … Continue reading BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool

Banking Trojan Metamorfo Hijacks Trusted Apps to Run Malware

Bitdefender researchers Janos Gergo SZELES and Ruben Andrei CONDOR have documented a new Metamorfo campaign that uses legitimate software components to compromise computers. Metamorfo is a family of banker Trojans that has been active since mid-2018. I… Continue reading Banking Trojan Metamorfo Hijacks Trusted Apps to Run Malware

Industry Reactions to Verizon 2020 DBIR: Feedback Friday

Verizon this week published its 2020 Data Breach Investigation Report (DBIR). The report is based on insights from thousands of incidents and it’s more detailed and more thorough than ever.
read more

Continue reading Industry Reactions to Verizon 2020 DBIR: Feedback Friday