Shadow Brokers Hit the Light of Day

Introduction On August 13, a previously unknown organization named the “Shadow Brokers” released files claiming to be tools used by the hacking organization named the “Equation Group”. Kaspersky dubbed this name for the organization in February of 2015, when they released a report about one of the most sophisticated hacking organizations they had ever seen.…


Attack of Things!

The rush to connect everything to the internet is leaving millions of everyday products vulnerable and ripe for abuse. We’ve seen internet connectivity added to appliances, athletic clothing, pill bottles and even forks. Security, if it’s considered at all, is often an afterthought for Internet of Things (IoT) devices. Everyone is more susceptible to attack…


What If Your ISP Could Stop Cybercrime Before It Happened?

This article was written by Jonathan Salem Baskin from Forbes and was legally licensed through the NewsCred publisher network. Network Operating Center in Broomfield, Colorado (Image Credit: Level 3 Communications) Although major hacks generate news headlines, most companies and institutions quietly contend ongoing web-based probes and attacks, with the average CISO at the largest businesses…


Black Hat Survival Guide: It’s All Fun and Games until Someone Gets Hacked (Will This Tinfoil Hat Fit in My Carry-On?)

Success breeds complacency. Complacency breeds failure. Only the paranoid survive. – Andy Grove   “You seem a little paranoid,” said my Lyft driver. “I am.” We were discussing my pending travel schedule and I was explaining the research I’ve conducted in the run up to Black Hat 2016. How do I safeguard my data during…