Vetting your vendors: money isn’t everything

Vetting vendors doesn’t have to be painful – if you know your risk tolerance posture, and have a mature communication channel with your own security team.

Read more

Goldeneye Ransomware – the Petya/Mischa combo rebranded

From March 2016 we’ve observed the evolution of an interesting low-level ransomware, Petya. Now, we are facing an outbreak of the fourth version – this time under a new name – Goldeneye, and, appropriately, a new, golden theme.

Read more

A week in security (Nov 27 – Dec 03)

A compilation of notable security news and blog posts from the 27th of November to the 3rd of December. This week, we touched on Gooligan, attribution, a new WhatsApp phishing campaign, another ransomware, and a one-of-a-kind Apple spam.

Read more

Fake WhatsApp email comes as a billing alert

Recently, we have received a report from one of our readers on Facebook regarding another criminal-driven campaign targeting WhatsApp users. It comes in the form of a phishing email, which our reader has forwarded for us to look into.

Read more

Attribution Part II: Don’t overthink it

In Part II of this three-part series, we take a deeper look into the mistakes one easily makes in terms of cyber attack attribution.

Read more

Select your language