background.png

The Cyber Feed

Protection Beyond the Perimeter Starts Here.

Recent Posts

Posts by Topic

see all

Get Updates from Us!

WannaCry, Petya and All That Is Wrong With the Cyber Security Ecosystem

No excuses. Don't even try to act shocked, or tell me you didn't know this could happen. In May 2017, the WannaCry ransomware spread viscously across the worldwide web, affecting more than 300,000 ...

Read More

WannaCry Is Back With a Vengeance - No Wait It's Petya!

It is said that, "those who do not learn history are doomed to repeat it".  In May 2017, the WannaCry ransomware virus spread quickly around the world infecting thousands of computers and locking ...

Read More

Cyber Security Operation Center Saves Philippine Banks in the Courtroom

On June 21st in Manila, Philippines, The Bank of the Philippine Islands (BPI) was brought before a Senate panel due to BPI’s system glitch which caused misposts on client accounts.  However, BPI's ...

Read More

What to look forward to at Infosec 2017

Infosecurity Europe  attracts the brightest minds in cybersecurity, with more than 13,500 people expected to attend this year’s conference. Held this Tuesday through Thursday, June 6-8, Infosec will ...

Read More

Prevention vs Detection in Cyber Security: Why Not Both?

Prevention has long been a favored method to stopping cybercriminals from harming organizations. For example, when the U.S. government started reviewing how it can enhance its cyber security stance, ...

Read More

Wanna Cry? The anatomy of the Recent attack

Last weekend, in the biggest attack of its kind ever recorded, the ransomware known as WannaCry/WanaCrypt0r 2.0 has swept organizations of all shapes and sizes across 167 countries.

Read More

How Social Media Becomes a Weapon against your Digital Brand

Social media is increasingly used by cybercriminals as an attack vector to run scams and carry out malicious attacks, ranging from account hijacking to impersonation of key employees. As social media ...

Read More

Cybersecurity Action Plan for 2017

  Faced with an evolving threat landscape and proliferating attack vectors, it is imperative for CISOs to stay ahead of the threat actors. If success is where preparation and opportunity meet, as the ...

Read More

3 Trends Shaping Retail Cybersecurity in 2017

I have just spent a couple of days with the top retailers in APAC, talking about digitalization and the risks this transformation presents to retailers globally. There is a shared concern among ...

Read More

Sentry MBA: A Tale of the Most Popular Credential Stuffing Attack Tool

According to Verizon’s latest annual data breach study, last year “63% of confirmed data breaches involved leveraging weak/default/stolen passwords.” In many cases, intruders rely on reused, stolen ...

Read More

SUBSCRIBE

download.jpg