• September 11, 2014
    A list of five million Gmail accounts, paired with what appear to be passwords, was leaked in a popular Russian cryptocurrency forum.
  • September 10, 2014
    Roughly a week after a massive batch of stolen and debit cards went on sale in the underground market pointing to a breach in large retail giant Home Depot, the company confirms that their payment systems have been compromised.
  • September 04, 2014
    When attackers look at a target network, they focus on the flaws that they can exploit, then customize their attacks based on these. What can IT admins do knowing that the weakest link usually lie with people, passwords, and places that are considered secure?
  • August 27, 2014
    United Postal Service (UPS) recently disclosed a widespread malware breach on 51 of its 4,470 franchise stores. This potentially compromised about 105,000 customer transactions between the period of March 26 and August 11, 2014 in most stores.
  • August 14, 2014
    Targeted attacks are designed to circumvent existing policies and solutions within the target network, making detection a challenge. To do this, IT administrators need to know what to look for, and where to check for signs of compromise.
  • August 06, 2014
    A Russian cybercrime ring known to have been running underground operations since 2004 allegedly stole 1.2 billion Internet usernames and passwords from 420,000 websites, including Fortune 500 companies.
  • July 28, 2014
    The PLEAD campaign is the second attack to target entities in Taiwan in the first half of 2014. Taiwanese agencies were also targeted in May using a Microsoft Word zero-day vulnerability.
  • July 28, 2014
    The targeted attack campaign Esile was found in the second half of 2013 trying to spread backdoor malware inside the networks of East Asian governments, electronic manufacturers, and telecommunications firms.
  • July 16, 2014
    In an ideal world, IT administrators go out of their way to protect the organization's information. However, even IT admins are prone to misconceptions that leave organizations vulnerable to attacks.