Yesterday the New York Times website was hi-jacked by the Syrian Electronic Army. Read more at our new blog.
Spearphishing Threat Chain & Edward Snowden
August 28, 2013What does Edward Snowden, the NSA leaker, teach us about spearphishing? Learn the answers at our new blog.
Combat ID in Cyberspace
August 26, 2013A recent article entitled Combat Identification in Cyberspace in the Small Wars Journal discusses Combat ID in the context of cyberwarfare, with a particular emphasis on email. Combat ID in email? This is email, not guns and bombs. The recent loss of the F-35 emphasizes the importance of the cyber engagement.
Read more at our new blog.
Advanced Attackers – Common RATs
August 23, 2013FireEye has released new research about the use of common RATs (remote access tools) by advanced attackers. Read more at our new blog.
Syrian Electronic Army Hacks Washington Post, CNN and Time
August 15, 2013Learn how the Syrian Electronic Army hacked the Wsahington Post, CNN and Time at our new blog.
Pakistan’s Cyberattack Infrastructure — Found In USA
August 9, 2013ThreatConnect has discovered artifacts of Pakistan’s cyberattack infrastructure in the USA. Read more at our new blog.
Spy vs. Spy 2.0
August 7, 2013Read about Dell Secureworks spying on Chinese cyberspies at our new blog.
New Tools — For Bad Guys
August 5, 2013A tool has been released that helps write deceptive emails. Learn more at our new blog.