background.png

The Cyber Feed

Protection Beyond the Perimeter Starts Here.

Posts by Topic

see all

Get Updates from Us!

Cybersecurity Health Check: It’s Time to Test How Strong Your Current Defenses Really Are

They say there are two kinds of companies: those that were hacked, and those that don’t yet know they were hacked. Companies seem to be consistently behind the curve when it comes to cybersecurity, ...

Read More

The Very Fine Line Between Hacking and Whistleblowing

  Generally agreed: Hacking is an illegal criminal activity whereby criminals use a computer to gain unauthorized access to data in a system. Generally agreed: Whistleblowing is a legal activity that ...

Read More

Cyber Criminals Take to the Sea

So, here’s a cybersecurity story you don’t usually read about... Pirates are most popularly known as a hook-handed, one-eyed swashbucklers with parrots on their shoulders continuously searching for ...

Read More

Could a List of 17,000 Hacked Twitter Accounts be Worth Over a Billion Dollars?

Earllier this week, our threat intelligence analysts “stumbled upon” yet another list of passwords and emails of 17,000 Twitter users. Well, they didn’t really stumble upon the list, the list was ...

Read More

What Lures Cyber Criminals Towards the Internet of Things?

IoT is a term coined by John Chambers, Cisco’s CEO, which has become synonymous with a variety of products and devices like Smartwatches, smart home and smart metering devices, augmented reality ...

Read More

Our Favorite Examples of How CEOs Respond to Cyber Breaches

In the last few years we witnessed some major breaches to some very big brands, these include the huge Target breach, the TalkTalk breach, the vicious Ashley Madison hack (where people paid with ...

Read More

Cybersecurity at the Rio Olympics: Who’s Gonna Take Home the Goods?

“Cyber intelligence companies and western government officials warn that the two-week sporting festival, which began last Friday, could lead to some of the highest levels of cyber criminal activity ...

Read More

How OurMine Found Pokemon, and Why They Were Looking

We’re never surprised when we hear that OurMine has been up to no good. They’ve proved their abilities with high-profile cyber attacks: Mark Zuckerberg, Jack Dorsey, Travis Kalanick, and even ...

Read More

What We Learned at RSA Singapore: How Cyber Aware is the APAC Region?

Last week in Singapore, RSA was a dynamic and stimulating gathering of security professionals showing their latest innovations that will bring the global community one step closer in the fight ...

Read More

Casual Connect 2016: From the Hackers’ Perspective

The online gaming realm is evidently a lucrative plateau for hackers to milk sensitive data out of emphatic game players and the virality that accompanies their hype. But what is it that attracts ...

Read More

SUBSCRIBE

download.jpg