Wanted: The Best Threat Intelligence Provider with APT Indicators

APT’s – advanced persistent threats – are among the most feared threats in the cyberspace. They are well known for their use of highly sophisticated techniques, long lasting intrusions, and their slow and stealthy movement through infiltrated infrastructures. Often backed by nation states, APT groups possess the Continue reading “Wanted: The Best Threat Intelligence Provider with APT Indicators”

The impact of GDPR on security research: A look at WHOIS

When individuals, companies, organizations, and governments register a domain, they are required to provide information to a domain registration company, called a registrar. This information usually includes their name, address, email address, phone number, administrative contact details (who has legal power and usually also who pays the bills), and technical contact details (who runs the infrastructure).1 Continue reading “The impact of GDPR on security research: A look at WHOIS”

Lower Barriers to Entry Fueling Growth in Cybercrime, Espionage and Even Security Research

Over the past few years, a very small number of cybercriminals have become quite sophisticated and are able to cause significant damage. At the same time, a much larger number of actors have found the decreasing amount skills and resources necessary to engage in profitable cybercrime reason enough Continue reading “Lower Barriers to Entry Fueling Growth in Cybercrime, Espionage and Even Security Research”