The Cyber Feed

Protection Beyond the Perimeter Starts Here.

Posts by Topic

see all

Get Updates from Us!

Cyber Week in APAC – The region is taking the war on cybercrime seriously, very.

We participated in several events in Singapore and the Philippines last week, and saw firsthand a great curiosity about and commitment to brand protection at a time of rampant cyber-attacks. One ...

Read More

Ever Wondered which Tools and Services Are Found on the Dark Web? Here are Some Examples.

The Dark Web is where the sunshine of regulated commerce doesn’t apply. Here you can find criminals selling weapons, illegally harvested organs and child pornography, for example. Here is also where ...

Read More

From hackers with love. A look behind the scenes of cybercrime - Part 1

It’s not a crazy idea. Many organizations – including the U.S. Department of Defense, Google, Apple, General Motors and others – work directly with so-called white hat hackers. These outfits pay ...

Read More

Cybersecurity Health Check: It’s Time to Test How Strong Your Current Defenses Really Are

They say there are two kinds of companies: those that were hacked, and those that don’t yet know they were hacked. Companies seem to be consistently behind the curve when it comes to cybersecurity, ...

Read More

The Very Fine Line Between Hacking and Whistleblowing

  Generally agreed: Hacking is an illegal criminal activity whereby criminals use a computer to gain unauthorized access to data in a system. Generally agreed: Whistleblowing is a legal activity that ...

Read More

Cyber Criminals Take to the Sea

So, here’s a cybersecurity story you don’t usually read about... Pirates are most popularly known as a hook-handed, one-eyed swashbucklers with parrots on their shoulders continuously searching for ...

Read More

Could a List of 17,000 Hacked Twitter Accounts be Worth Over a Billion Dollars?

Earllier this week, our threat intelligence analysts “stumbled upon” yet another list of passwords and emails of 17,000 Twitter users. Well, they didn’t really stumble upon the list, the list was ...

Read More

What Lures Cyber Criminals Towards the Internet of Things?

IoT is a term coined by John Chambers, Cisco’s CEO, which has become synonymous with a variety of products and devices like Smartwatches, smart home and smart metering devices, augmented reality ...

Read More

Our Favorite Examples of How CEOs Respond to Cyber Breaches

In the last few years we witnessed some major breaches to some very big brands, these include the huge Target breach, the TalkTalk breach, the vicious Ashley Madison hack (where people paid with ...

Read More

Cybersecurity at the Rio Olympics: Who’s Gonna Take Home the Goods?

“Cyber intelligence companies and western government officials warn that the two-week sporting festival, which began last Friday, could lead to some of the highest levels of cyber criminal activity ...

Read More