TECHNOLOGY > Forensics
TECHNOLOGY > Forensics Category Archive« Back to News
Top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean Cybergang known as Lazarus Group.
Building security metrics, measuring risk and improving cyber incident communications in your organisation aren’t “one and done” processes.
Held to ransom by cyber extortionists? You might get easy payment terms, but absolutely no discount.
DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.
Threat analysts need a more robust framework for characterizing suspicious activity on their endpoints and networks. By Jane Ginn
Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.
There are concrete strategies & commercial tools available to use to protect yourself against ransomware attacks. By Dinesh Kumar Aggarwal
An Iran-linked advanced persistent threat (APT) group has used fake University of Oxford websites to deliver malware to victims.
The cost of not taking cyber security seriously today is just like the cost of not having your business properly insured.