APT (Advanced Persistent Threats)

Inner Circle podcast hosted by Tony Bradley TechSpective

Mikko Hyppönen Discusses When It’s OK to Respond to a Cyber Attack with Missiles

Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or should cyber attacks only be met with a

Mikko Hyppönen Discusses When It’s OK to Respond to a Cyber Attack with Missiles Read More »

machine learning exploit detection recursive neural network

Using Machine Learning to Reduce False Positives

Today’s threat landscape is massive and expanding at an alarming rate—especially given the explosion of mobile devices, hybrid cloud environments, DevOps, and containers. Organizations of all sizes, and across all industries, struggle to keep up with the volume of legitimate

Using Machine Learning to Reduce False Positives Read More »

Inner Circle podcast hosted by Tony Bradley TechSpective

Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

Inner Circle Podcast Episode 018 …and vice versa. That should be part of the title too, but it was already quite lengthy. On this episode of The Inner Circle, I am joined by Kevin Livelli, Director of Threat Intelligence at

Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook Read More »

Kaggle hackathon Wallarm machine learning

Hackathon Uses Machine Learning to Improve Cybersecurity

Machine learning (ML) and artificial intelligence (AI) are hot technologies with significant promise for shaping the future, but it isn’t enough to understand ML or AI theory. Sure, you can gain a lot of knowledge and information from reading and

Hackathon Uses Machine Learning to Improve Cybersecurity Read More »

OceanLotus Group remote access trojans

Cylance Report Reveals Malware and Tactics of OceanLotus Group and Weakness of Traditional AV

Exploits and attackers come in various forms. Just like crime in real life, there are vandals and people just trying to wreak havoc, there are petty thieves and lone wolf criminals, and there is organized crime—crime families that make a

Cylance Report Reveals Malware and Tactics of OceanLotus Group and Weakness of Traditional AV Read More »

Wannacry

WannaCry Ransomware: A Detailed Analysis of the Attack

Unless you’re living under a rock, you must be familiar with the massive ransomware attack called WannaCry that targeted more than 200,000 systems on its first day and spread worldwide very rapidly. In this article, I’ll share an in-depth analysis

WannaCry Ransomware: A Detailed Analysis of the Attack Read More »

Scroll to Top