background.png

The Cyber Feed

Protection Beyond the Perimeter Starts Here.

Posts by Topic

see all

Get Updates from Us!

Post Soltra Era - Our Quick Analysis

The story began in 2014, when FS-ISAC and DTCC, entered a joint venture to develop a product named Soltra. The idea was to streamline the process of aggregating threat intelligence from a wide range ...

Read More

FriendFinder ignored warnings, became next victim in the Cyberwar on Sex Industry

Back in July of 2015, Ashley Madison, a popular website dedicated to facilitating marital affairs, was hacked by a group called the Impact Team. The hackers demanded that Ashley Madison shut down ...

Read More

An Inside Look At The Hacker Communities of the Dark Web

Most hackers actually don’t fit the common stereotype of a hoodie-attired, jobless loner glued to a computer screen for days on end in a quiet basement.

Read More

BlackHat London 2016: Your opportunity to check how exposed your company is to digital threats

For four days at the start of November 2016, Europe’s top cybersecurity professionals and researchers will gather in London for Black Hat Europe.

Read More

Cyber Week in APAC – The region is taking the war on cybercrime seriously, very.

We participated in several events in Singapore and the Philippines last week, and saw firsthand a great curiosity about and commitment to brand protection at a time of rampant cyber-attacks. One ...

Read More

Ever Wondered which Tools and Services Are Found on the Dark Web? Here are Some Examples.

The Dark Web is where the sunshine of regulated commerce doesn’t apply. Here you can find criminals selling weapons, illegally harvested organs and child pornography, for example. Here is also where ...

Read More

From hackers with love. A look behind the scenes of cybercrime - Part 1

It’s not a crazy idea. Many organizations – including the U.S. Department of Defense, Google, Apple, General Motors and others – work directly with so-called white hat hackers. These outfits pay ...

Read More

Cybersecurity Health Check: It’s Time to Test How Strong Your Current Defenses Really Are

They say there are two kinds of companies: those that were hacked, and those that don’t yet know they were hacked. Companies seem to be consistently behind the curve when it comes to cybersecurity, ...

Read More

The Very Fine Line Between Hacking and Whistleblowing

  Generally agreed: Hacking is an illegal criminal activity whereby criminals use a computer to gain unauthorized access to data in a system. Generally agreed: Whistleblowing is a legal activity that ...

Read More

Cyber Criminals Take to the Sea

So, here’s a cybersecurity story you don’t usually read about... Pirates are most popularly known as a hook-handed, one-eyed swashbucklers with parrots on their shoulders continuously searching for ...

Read More

SUBSCRIBE

download.jpg