This post is based on an interview with Mr. Neal Pollard. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of …
Muhstik Ransomware Victim Hacks Back, Releases Decryption Keys
A cybercrime victim whose QNAP network-attacked storage (NAS) device was recently infected with Muhstik ransomware decided to try and hack back the attackers, which was a rather successful effort: the …
Continue Reading about Muhstik Ransomware Victim Hacks Back, Releases Decryption Keys
The Executive’s Guide to Cyber Insurance
This special report provides an overview of the dynamic trends underway in the cyber insurance market, including actionable information that executives can put to use right now in determining the …
Continue Reading about The Executive’s Guide to Cyber Insurance
Cyber Threat Analysis Report Vol 1, Edition 10
No Technology Can Replace Wetware A lot of malicious activity succeeds because it first exploits a human being, and then technology. This isn’t a call to burn your security tools, but a reminder that …
Continue Reading about Cyber Threat Analysis Report Vol 1, Edition 10
Cyber Threat Analysis Report Vol 1, Edition 9
A Forlorn Hope No matter how much you try to spin it, cybersecurity is a cost. You can implement cheap or even free solutions to address a wide range of problems, but there has yet to be a …
Continue Reading about Cyber Threat Analysis Report Vol 1, Edition 9
Cyber Threat Analysis Report Vol 1, Edition 8
Everyone with a Computer is a Target What you do, where you’re at, how technical or ‘sophisticated’ you are means nothing to malicious actors these days. Those might have been conditions they …
Continue Reading about Cyber Threat Analysis Report Vol 1, Edition 8
AI, quantum computing and 5G could make criminals more dangerous than ever, warn police
A new Europol report[pdf] sheds light on the way emerging technology is shaping the cyber crime economy as well as law enforcement efforts to fight cyber crime. The research states that the use of …
Cyber Sensemaking – Essential Observations for the Next Five Years
I’ve spent over 25 years working in the fields of cybersecurity and cyberconflict across a multitude of domains including government, corporate, think tank, and academic. This article is the first in …
Continue Reading about Cyber Sensemaking – Essential Observations for the Next Five Years
The Cyber Threat Analysis Report Volume 1, Edition 1
Spike in Hacking of US Networks is said to be Tied to China and Iran US businesses and government agencies have been targeted in aggressive attacks by Iranian and Chinese hackers who security experts …
Continue Reading about The Cyber Threat Analysis Report Volume 1, Edition 1
Malware can now evade cloud security tools, as cybercriminals target public cloud users
Rocke Group, a cybercrime group believed to be operating from China, has developed cryptocurrency mining software that can uninstall cloud-based security solutions from targeted systems as a way of …