Ransomware

ransomware targeted attacks privilege interaction

Exposing Targeted Attacks by Observing Privilege Interactions Between Entities

In May 2019, most of Baltimore’s government computer systems were infected with a new and aggressive ransomware variant named RobbinHood. All servers, with the exception of essential services, were taken offline as a result of targeted attacks. In a ransom

Exposing Targeted Attacks by Observing Privilege Interactions Between Entities Read More »

machine learning artificial intelligence BlackBerry Intelligent Security Cylance

BlackBerry’s AI Intelligent Security Has Broad Implications

I’ve been working in and out of security and law enforcement for much of my life. The biggest exposures I’ve run into and the easiest ways through security have always been through the employee. Whether it was a disgruntled employee

BlackBerry’s AI Intelligent Security Has Broad Implications Read More »

cybersecurity predictions IoT security smart city security

Cybersecurity Professionals Weigh In On What to Expect in 2019

2019 is underway. Two weeks down, fifty to go. Technology continues to evolve rapidly and the threat landscape is constantly shifting. It’s challenging for organizations to try and stay a step ahead of cybercriminals and break out of the cycle

Cybersecurity Professionals Weigh In On What to Expect in 2019 Read More »

Inner Circle podcast hosted by Tony Bradley TechSpective

Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

Inner Circle Podcast Episode 018 …and vice versa. That should be part of the title too, but it was already quite lengthy. On this episode of The Inner Circle, I am joined by Kevin Livelli, Director of Threat Intelligence at

Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook Read More »

crystal ball 2018 cybersecurity predictions

Was The Crystal Ball Crystal Clear? Reflecting on 2018 Cybersecurity Predictions

We’re halfway through 2018 and several cybersecurity predictions made in late 2017 have, unfortunately, already come true. From cryptojackers becoming an actual threat to organizations instead of just a nuisance for end users, to hardware vulnerabilities that may even impact

Was The Crystal Ball Crystal Clear? Reflecting on 2018 Cybersecurity Predictions Read More »

Scroll to Top