CDM Featured Whitepapers

Defending Against Data Breach

Linoma

Are Your Information Security Investments Performing?

Redscan

Knowns & Unknowns

IKANOW


News

Is Infocube tied to the Carbanak cybercrime gang?

The security expert Brian Krebs investigated the links between the Carbanak cybercrime gang and…

Snowden and Andrew “Bunnie” Huang devised the Introspection Engine to avoid surveillance

The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection…

Turkish Government Blocks Access To WikiLeaks

The Turkish Government blocked the access to WikiLeaks after release of the Erdogan emails,…

OpenSSH affected by a user enumeration bug

The popular OpenSSH is affected by a user enumeration bug that could be exploited…

Android.Fakebank.B inhibits outgoing calls to bank customer services

Security researchers from Symantec have discovered a new variant of the Android.Fakebank.B banking trojan…

Experts published IE Exploit code and crooks added it to Neutrino EK

Operators behind the Neutrino EK have added the code to exploit an Internet Explorer…

Unmasking malware’s use of TLS without flow decryption

Researchers devised a method to unmask malware’s use of TLS without decrypting the data…

PoS systems infected in 1 in 20 Wendy’s stores, credit card exposed

The hack suffered by Wendy’s fast-food chain was bigger than thought, payment card data…

NetTraveler APT still targets European and Russian interests

Security experts from ProofPoint have spotted a new campaign operated by the APT Group…

Espionage SBDH Toolkit used to target European Countries

ESET security firm has uncovered an espionage toolkit dubbed SBDH that was used in…