• July 28, 2014
    The targeted attack campaign Esile was found in the second half of 2013 trying to spread backdoor malware inside the networks of East Asian governments, electronic manufacturers, and telecommunications firms.
  • July 16, 2014
    In an ideal world, IT administrators go out of their way to protect the organization's information. However, even IT admins are prone to misconceptions that leave organizations vulnerable to attacks.
  • July 12, 2014
    Ninety-six percent of enterprises think they know what targeted attack campaigns are. But studies show that more than half can't even differentiate between traditional threats and actual attacks. How far is enterprise perception on their targeted attack pr
  • June 25, 2014
    Attackers have found a new use for Dropbox, apart from just hosting malware. This new tactic uses the PlugX remote access tool to download its C&C server settings using the free file storing service.
  • May 26, 2014
    Ever heard of an attack that plays possum? The Siesta campaign gets in mostly via spear-phishing emails and then lies dormant for varied time periods before gathering information.
  • May 26, 2014
    A new targeted attack campaign is waking up large numbers of industries via spear phishing emails. Promptly named, Siesta, the campaign sets in by “sleeping” first for varied time periods before moving on to eventually stealing valuable company data.
  • May 26, 2014
    Are all these large-scale Point-of-Sale (PoS) system attacks proof that attackers target payment cards more? While naming 2013 the "Year of the Retailer Breach", Verizon says POS-related cases have gone down in numbers since they peaked in 2010.
  • May 26, 2014
    Attackers are finding more and more ways to exploit weaknesses, and now, we see the BLYPT backdoor family using blobs in its routines. Who are the targets of this new targeted attack campaign and how can it get in?
  • May 26, 2014
    Attackers are finding more and more ways to exploit weaknesses, and now, we see the BLYPT backdoor family using blobs in its routines. Who are the targets of this new targeted attack campaign and how can it get in?