• January 12, 2015
    A cyber attack on a German steel plant has been confirmed to suffer a significant amount of damage, putting the spotlight on the evident lack of security across a number of different critical facilities and institutions.
  • December 22, 2014
    South Korean nuclear company, Korea Hydro and Nuclear Power Co (KHNP), became the source of headlines when it fell victim to an attack that resulted in the leak of company information, including employee information and plant blue prints.
  • December 16, 2014
    During a security evaluation of AIS, we found that both the implementation, as well as the protocol specification of AIS, is affected by several threats, from spoofing and hijacking to availability disruption.
  • December 08, 2014
    While Sony recovers from the massive hack, we continue to monitor investigations and developments. Here's a rundown of what happened, what was stolen, who’s being implicated, and tips on how you can defend against likely attacks. [updated]
  • December 06, 2014
    A look into the other WIPALL malware variants that may be linked to the Sony Pictures incident, including a variant that disables the running antivirus application and another that displays a warning message.
  • December 05, 2014
    How did hackers manage to drop a “warning“ wallpaper into Sony Pictures' office computers? With a malware family that we've seen before.
  • December 03, 2014
    Dealing with attacks, intrusions, and data thefts is now a part of doing business for many organizations. The recent attack on Sony Pictures highlights the importance of proper incident response.
  • December 01, 2014
    The United States Industrial Control System Cyber Emergency Response Team recently released an advisory warning operators of industrial control systems that there is an active cyber crime campaign targeting them with Trojans and backdoor attacks.
  • November 25, 2014
    Reports have implicated a sophisticated piece of malware known as Regin that has been in use for years. Designed to carry out long-term stealthy surveillance on would-be victims, telecom companies are believed to have been its primary targets.