Loading...

NSA reveals a perilous security issue in Windows 10

The US National Security Service (NSA) has discovered a serious security problem in Windows 10, which could be used by hackers for creating malicious software that, at a first glance, looks legitimate. Microsoft released a patch and pointed out that no evidence has been seen that the bug was actually used by a hacker. According [...]

2020-01-27T13:22:36+00:00January 27th, 2020|Blog|

Thousands of websites distribute malware on macOS

In 2019, Kaspersky prevented attacks by Shlayer, a malicious Trojan family, on at least 10% of devices using Kaspersky Mac protection solutions, making this threat the most widespread for MacOS users. An intelligent malware distribution system is spreading through a network of affiliates, entertainment websites, and even Wikipedia, proving that even users who visit only [...]

2020-01-27T08:59:56+00:00January 27th, 2020|Blog|

1 out of 8 companies in Europe has been under attack on their IT systems during 2019

European companies intesify their efforts to remain safe from cyber attacks. During 2019, 90% of them, which have 10 or more employees, have gotten at least one security measure regarding their computer and communications systems. According to published data, one out of three enterprises (34%) declared that they have documents, practices or procedures related to [...]

2020-01-20T17:59:28+00:00January 20th, 2020|Blog|

ToTok; the “not only” chat app

There has been a widely spread suspicion that smartphone chat applications serve as mass surveillance tools for intelligence agencies of various countries around the world. ToTok, one of the most popular chat applications, is believed by the Unite States Intelligence Community to be such an application. The New York Times revealed ToTok messaging app to [...]

2020-01-15T11:53:43+00:00January 15th, 2020|Blog|

Cybersecurity Awareness for municipalities: what are the training needs?

We have now finished a first round of tests to evaluate how our users work with the CS-AWARE system in their own contexts. The users were tested with simulations: for various reasons it was better to ‘inject’ cyberthreats than to wait for them to happen in real time. As a consequence, our users were subjected [...]

2020-01-15T11:50:15+00:00January 15th, 2020|Blog|

We have to seize an ambitious challenge and build a sustainable new business venture out of our project!

In the last months we also had experienced a change in the CS-AWARE consortium: partner University of Passau in Germany has left the project and was replaced by new partner, the University of St. Gallen in Switzerland. If one expects to find any Machiavellian conspiracies there has been none! The original project application had been [...]

2020-01-15T11:47:03+00:00January 15th, 2020|Blog|

ESET discovered an abnormal installing technique

ESET research team, during the analysis of cyber attack aiming for Middle East targets, detected a technically interesting downloader. The malware uses a number of contradictory techniques, one of them standing out: the insertion of a local port monitor system registered as “Default Print Monitor”. Due to this technique, ESET researches have named the downloader [...]

2020-01-15T11:13:32+00:00January 15th, 2020|Blog|

Threat predictions for 2020

Increase in complexity and sophistication as well as more targeted attacks are expected in the upcoming 12 months based on cyber crime activity of the past year, according to various resources that have conducted research over the subject. Advancements in artificial intelligence and machine learning have resulted in significant technological gains, but threat actors are [...]

2020-01-15T11:10:37+00:00January 15th, 2020|Blog|

AI or not AI; that’s the question

The National Institute of Standards and Technology have had plans to move to a vulnerability scoring method that uses IBM’s Watson artificial intelligence system by October 2019. So far, Watson stumbled when evaluating new and complex vulnerabilities. AI is sneaking in to cyber security business. Does it make us stronger or more vulnerable? AI [...]

2019-12-31T09:06:03+00:00December 31st, 2019|Blog|

Interoperability challenges of cyberthreat intelligence

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing [...]

2020-10-12T10:13:21+00:00November 29th, 2019|Blog|
Go to Top