Threat Intelligence

ISIS Cyber Capabilities

Introduction At the end of April 2015, the US Government announced the first attack conducted by the Cyber Command against online activities conducted by mem

Cyber Criminal Ecosystems in the Deep Web

Introduction The analysis of black markets is essential to understand the evolution of phenomena in the criminal underground. The first aspect to consider wh

Top 7 Android Ransomware Threats

Malicious programs categorized as ransomware, which encrypts their victims' personal files and demands a ransom for restoring the locked data, proved to be e

ISIL, Terrorism and Technology: A Dangerous Mix

Introduction I was watching the Homeland series on TV when I received the news of the dramatic events in Paris. The introduction to this latest episode was e

CISA is law: Now what?

The CISA cybersecurity bill passed U.S. Senate despite the fact that privacy advocates, private companies and civil liberties groups have expressed their dou

EMV and Threat Intelligence in the Prevention of Payment Card Frauds

Current Scenario Credit card data are a precious commodity in the criminal ecosystem, the number of data breaches involving payment card data continues to in

Animal Farm APT and the Shadow of French Intelligence

Babacar and Casper Almost every government is working to improve its cyber-capabilities. The majority of them already have in their arsenal powerful espionag

Card fraud in the deep web

The majority of activities related to credit card fraud are made in the underground forums and specialized hidden services in the deep web. These environme

APT28: Cybercrime or State-sponsored Hacking?

Once upon the APT28 In October of 2014, the security firm FireEye published a report that revealed the existence of a group of Russian hackers, dubbed APT28,

PoS Malware is More Effective and Dangerous

Introduction to POS malware In September 2014, experts at Trustwave firm published an interesting report on the evolution of the point-of-sale (PoS) malware