Wanted: The Best Threat Intelligence Provider with APT Indicators

APT’s – advanced persistent threats – are among the most feared threats in the cyberspace. They are well known for their use of highly sophisticated techniques, long lasting intrusions, and their slow and stealthy movement through infiltrated infrastructures. Often backed by nation states, APT groups possess the Continue reading “Wanted: The Best Threat Intelligence Provider with APT Indicators”

Data in mysterious places – the subtle crisis of data harvesting apps

Recent news stories highlight the danger of unwanted data exfiltration by popular applications. The use of apps is increasingly important across working environments; recognizing the potential threat that they pose and implementing appropriate safeguards tailored to organizational needs is critical.

Continue reading “Data in mysterious places – the subtle crisis of data harvesting apps”

The impact of GDPR on security research: A look at WHOIS

When individuals, companies, organizations, and governments register a domain, they are required to provide information to a domain registration company, called a registrar. This information usually includes their name, address, email address, phone number, administrative contact details (who has legal power and usually also who pays the bills), and technical contact details (who runs the infrastructure).1 Continue reading “The impact of GDPR on security research: A look at WHOIS”