Patch it or suffer cryptomining attacks
Check Point Software has released its April's Most Wanted Malware blog. It sends a warning to IT admins that they need to do more to get their house in order. It...
NCA outlines 2018 analysis of serious and organised crime threats
The National Crime Agency(NCA) has delivered its annual assessment of serious and organised (SOC) crime threats to the UK. This is the fifth time it has published this report and it...
Fredrick Westerdahl talks threat intelligence
Enterprise Times flew into Gothenburg to visit the NTT Security, Security Operations Centre (SOC). While there we were able to catch up with Fredrik Westerdahl, Senior Director of Threat Detection in...
What are cyber security professionals worth?
Exabeam has published its 2018 Cyber Security Professionals Salary and Job Report (registration required). While the survey pool was low at just 481 respondents, the results are interesting none the less.
Given...
SilverTerrier uses malware to drive BEC attacks
Unit 42, part of Palo Alto Networks, has been tracking the rise of Business Email Compromise attacks from Nigeria for several years. It has monitored the evolution of the old fashioned...
NTT Security says UK manufacturing was top hacking target
NTT Security, the cyber security division of NTT has released its Global Threat Intelligence Report 2018 (registration required). There are a number of surprises in this report including the top targets...
Rimini Street moves to add business value
Rimini Street has announced the addition of two new and one extended solution offerings to its portfolio of services. Historically the company has offered maintenance services around ERP solutions such as Oracle...
Webstresser goes offline in coordinated strike
Operation PowerOFF has forced Webstresser, a cyber attack for hire site, offline. Webstresser is credited with being involved in over four million cyber attacks across the globe. Taking it offline is...
North Korea’s elite abandons Western social media
Cyber threat analysis from Recorded Future's Insikt Group shows how North Korea's ruling elite is changing its Internet behaviour.
This is the third report from the Insikt Group looking at North Korea....
F-Secure creates undetectable hotel master keys
Security researchers at Finnish security vendor F-Secure have discovered that they can make hotel master keys out of thin air. This is an attack that is not believed to have been...