White Networks
Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things; white as in...
Exploit Kits Improve Evasion Techniques
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that...
New Exploit of Sandworm Zero-Day Could Bypass Official Patch
Update of October 25: Some comments posted after we published this report suggest that our proof-of-concept exploit will trigger the...
The Future of Technology: 2025
This blog post was written by Penny Baldwin. Connected technology is changing everything from physical devices to web security. The...
Trust Is the Most Valuable Asset
The most valuable asset for actors in cyberspace is trust. It is an important ingredient in successful business operations as...
Trailing the Trojan njRAT
One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often...
The Internet of Things Needs a Standard. There’s a Consortium for That
Let’s talk about networks. A network can imply a number of things: it can imply a group of friends, coworkers...
GameOver Zeus/Cryptolocker: Am I Still Infected?
It has been two weeks since the announcement by multiple global law enforcement agencies regarding the takedown of the communications...
Stay Connected Safely When Using Free Wi-Fi in Public Areas
I am just back from my summer hols, and feeling absolutely refreshed! Holidays are so necessary to recharge you and...