Top 3 Malware Bogeymen Keeping CISOs Up at Night

Top 3 Malware Bogeymen Keeping CISOs Up at Night

What keeps CISOs up at night? Of all the cyberthreats, malware sends chills down a CISO’s spine, according to The CyberEdge Group’s recently released 2016 Cyberthreat Defense Report. Malware bogeymen come in many shapes and sizes. Here are three of the most nefarious in their respective categories: Ransomware: CryptoWall Ransomware has come a long way [...]

PCI DSS: Centuries in the Making?

PCI DSS: Centuries in the Making?

The modern day Payment Card Industry Data Security Standard (PCI DSS) v3.1, applies a robust layered approach for the security of cardholder data, applying the concept of defence in depth (DiD). This concept is nothing new and can be seen to have been applied by the Roman Empire in the 4th century AD1 and developed [...]

ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe

ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe

Unit 42 is currently researching an attack campaign that targets government and military personnel of India. This attack appears to overlap with the Operation Transparent Tribe andOperation C-Major campaigns that targeted Indian embassies in Saudi Arabia and Kazakhstan, as well as the Indian military. We are tracking the group of actors involved in this campaign [...]

Palo Alto Networks Researchers Discover Critical IE Vulnerabilities

Palo Alto Networks Researchers Discover Critical IE Vulnerabilities

Palo Alto Networks researchers Tongbo Luo and Hui Gao were credited with the discoveries of new critical Microsoft vulnerabilities affecting Internet Explorer (IE) versions 7, 8, 9, 10 and 11 on affected Windows clients. These vulnerabilities are documented in Microsoft Security BulletinMS15-106 and MS15-112. In our continued commitment to the security research community, these vulnerabilities were disclosed to Microsoft through [...]