A new malware compromise identified last week was using malware officially signed and provided by its software manufacturer for public download by millions of people.
Brett Williams |
29 Sep |
Read more
Recent attacks such as WannaCry and NotPetya have demonstrated that hackers are more familiar with the vulnerabilities of unsupported systems than many organisations themselves.
Brett Williams |
01 Aug |
Read more
Let’s go threat-hunting. When the hunters and tools have been assembled, let us explore the thought processes that prepare them for a successful hunt, as well as a proven methodology called the hunt chain.
Brett Williams |
23 Jun |
Read more
Research is in progress that will make it easier to find patterns of attack by cyber-criminals, and share results with the larger community.
Brett Williams |
27 Jul |
Read more