Threat Intelligence

Intellectual Property Crimes in the Dark Web

An Intellectual Property (IP) crime is committed every time someone uses an intellectual property right without the owner's authorization. According to the E

Top 5 Smartest Malware Programs

1. Introduction The growing threat of malware is one of the biggest Cyber Security threats of today. Malware is a term that encompasses a plethora of covert,

Is Russian Intelligence Using Tainted Software to Access Corporate and Government Networks?

Documents leaked by the famous whistleblower Edward Snowden shed light about the surveillance machine used by the NSA to spy on allies and foreign government

Vault 7 Leaks: Inside the CIA's Secret Kingdom (July-August 07)

Introduction Let's continue to analyze the information contained in files leaked by the organization Wikileaks and allegedly originating from a network of th

DragonFly 2.0: The Alleged Nation-State Actor Hits the Energy Sector Again

Security experts at Symantec have uncovered a hacking campaign against companies in the energy industry that appears to be an activity linked to the infamous

Russian APT Groups Continue Their Stealthy Operations

Russian APT groups continue their cyber espionage activities against governments and organizations worldwide, in this post I have grouped the details related

Massive Petya Attack: Cybercrime or Information Warfare?

Hits organizations in several states Just five weeks after the WannaCry massive attack, a new wave of ransomware-bases attack hit targets in various countrie

SAP SECURITY FOR CISO: SAP Attacks and Incidents

If you read this series, you already know enough about SAP ERP Security to discover a real impact of having insecure SAP implementation. Recently, Crowd Rese

Role of Threat Intelligence in Business World

New, sophisticated threats persist in emerging daily across various platforms like social media, mobile, email and web applications. Simultaneously, new, hig

WikiLeaks Vault 7 Data Leak: Another Earthquake in the Intelligence Community

The WikiLeaks organization obtained thousands of files allegedly originating from a high-security network of the U.S. Central Intelligence Agency (CIA). T