Syrian Electronic Army – Sophisticated?

August 29, 2013

Yesterday the New York Times website was hi-jacked by the Syrian Electronic Army.  Read more at our new blog.


Spearphishing Threat Chain & Edward Snowden

August 28, 2013

What does Edward Snowden, the NSA leaker, teach us about spearphishing?  Learn the answers at our new blog.


Combat ID in Cyberspace

August 26, 2013

A recent article entitled Combat Identification in Cyberspace in the Small Wars Journal discusses Combat ID in the context of cyberwarfare, with a particular emphasis on email.  Combat ID in email?  This is email, not guns and bombs.  The recent loss of the F-35 emphasizes the importance of the cyber engagement.

Read more at our new blog.


Advanced Attackers – Common RATs

August 23, 2013

FireEye has released new research about the use of common RATs (remote access tools) by advanced attackers. Read more at our new blog.


Syrian Electronic Army Hacks Washington Post, CNN and Time

August 15, 2013

Learn how the Syrian Electronic Army hacked the Wsahington Post, CNN and Time at our new blog.


Pakistan’s Cyberattack Infrastructure — Found In USA

August 9, 2013

ThreatConnect has discovered artifacts of Pakistan’s cyberattack infrastructure in the USA.  Read more at our new blog.


Spy vs. Spy 2.0

August 7, 2013

Read about Dell Secureworks spying on Chinese cyberspies at our new blog.


Your Bleeped Up Brain

August 6, 2013

The H2 Series, Your Bleeped Up Brain, explains how your brain works and how it can be deceived.  Learn more at our new blog.


New Tools — For Bad Guys

August 5, 2013

A tool has been released that helps write deceptive emails.  Learn more at our new blog.


Spearphishing Tricks — Everyone

August 2, 2013

The Los Angeles Times is reporting that new research from the State University of North Carolina which demonstrates the effectiveness of spearphishing.  Learn more by visiting our new blog.