Cyber Security

How Threat Actor Profiling Enhances Security Resilience – Part 1

by Ben Kapon

posted at October 15, 2019

When it comes to threat actors capable of carrying out significant cyber-attacks and posing a real threat to your security resilience, there are more differences than similarities. Threat actor profiling is inefficient as long as it remains sporadic and dependent on different vendors’ research and publication of threat intelligence.

Arabic-Speaking Threat Actor Recycles the Source Code of Popular RAT SpyNote and Sells it in the Dark Web, as New

by Verint Cyber Threat Intelligence Research Team

posted at September 12, 2019

Recent Android RAT, posted for sale on the dark web, MobiHok v4, seems to be based on the source code of the Android RAT SpyNote, which was leaked in 2016.

Demonstrating the Importance of Intelligence for National Security at ISDEF 2019

by Colleen Gustitus

posted at May 28, 2019

Though the meaning of “security” has evolved significantly over the last several years, one fact remains certain: protecting people, property, and assets has never been more important than in today’s rapidly expanding risk landscape. In addition, while this applies to mission-critical organizations of all shapes and sizes, there is one market that must contend with

The Awakening of PoS Malware (or, has it really been dormant?)

by Verint Cyber Threat Intelligence Research Team

posted at May 7, 2019

The peak of activity of Point-of-Sale (PoS) malware was in late 2013 (with the disclosure of the notorious Target breach[1]), and over the course of 2014, when we witnessed the development and trade of new PoS malware strains. The vigorous discussions on hacking communities at the time, has led hackers to believe PoS malware would