CDM Featured Whitepapers

Defending Against Data Breach

Linoma

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

A Culture of Cybersecurity: The Only Way Forward

Logical Operations


News

Linux Shishiga malware, a threat in dangerous evolution

Malware researchers from security firm ESET have discovered a new Linux threat dubbed Shishiga…

Europol, European police agencies and private actors dismantled cybercrime ring

The Europol coordinated an international operation that dismantled a cybercrime ring that was offering…

Chinese APTs targeted the South Korean THAAD anti-missile systems

According to researchers at FireEye, Chinese hackers targeted the South Korean Terminal High Altitude…

Karmen Ransomware, a cheap RaaS service that implements anti-analysis features

Experts at Recorded Future have discovered a cheap RaaS, the Karmen Ransomware that deletes decryptor if…

Microsoft biannual transparency report – US foreign intelligence surveillance requests more than doubled

Microsoft published the biannual transparency report – The number of US foreign intelligence surveillance…

Terror EK rising in the threat landscape while Sundown EK drops

The Sundown EK has been inactive since early this year, the Terror EK is…

Cyber Security Chicago to Debut in October 2017

Cyber Security Chicago to Debut in October 2017 Fast-Growing Cybersecurity Event Series Makes its…

Symantec confirms that Longhorn group is tied to CIA operators detailed in Vault 7

Symantec reportedly linked the CIA hacking tools to a number of cyber attacks powered…

Dridex banking Trojan campaign exploited Microsoft Word 0day recently revealed

Millions of people were targeted by a phishing campaign exploiting a Microsoft Word 0day and…

Alleged Russian hacker arrested in Spain reportedly over US Presidential Election Hack

Spanish law enforcement arrested in Barcelona the Russian hacker Pyotr Levashov who is suspected…

Show Buttons
Hide Buttons