Those behind the widespread intrusion into government and corporate networks exploited seams in U.S. defenses and gave away nothing to American monitoring of their systems. Read More…

Those behind the widespread intrusion into government and corporate networks exploited seams in U.S. defenses and gave away nothing to American monitoring of their systems. Read More…
The broad Russian espionage attack on the U.S. government and private companies, underway since spring and detected only a few weeks ago, is among the greatest intelligence failures of modern times. Read More…
Multiple security professionals said stolen credentials on Exploit.in were part of a tidal wave of business email compromise attacks. Read More.
The rapid and recent rise of cyber threat actor group Indonesian Cyber Jawa represents a pivot within the Indonesian cyber underground towards a more sophisticated attack toolkit from a relatively underrepresented underground criminal faction. The group is concentrating its defacement efforts on online retailers while simultaneously attempting to defraud targets in the same business vertical.
As data exfiltration threats and bigger ransom requests become the norm, security professionals are advancing from the basic “keep good backups” advice.Read More
Our Director of Intelligence, Adam Darrah, in a frank discussion with Chuck Harold from SecurityGuyTV.com at the Corona-Con Virtual Security Conference about election security. Watch Now
Vigilante’s Director of Intelligence, Adam Darrah, busts election security myths in Security Management’s Octobers’ Podcast edition Click here to listen
Greg Otto talks with Adam Darrah, director of intelligence at Vigilante, about hacker gangs on the dark web, how they run their ransomware operations, and if the cybersecurity community ever gets past the mindset of shaming victims when they are hit with a breach. Click here to listen to the podcast
It’s not enough to acknowledge the threat of ransomware—companies need to be positioned to communicate with threat actors (whether directly or indirectly), contain damage and minimize business interruption associated with this increasingly common form of cyberattack. I talked to David Shear, threat data governance and integration manager of Vigilante, about best practices in preparation and response to ransomware events. Read…
“Air gapping,” or isolating certain systems by keeping them disconnected from the public internet, or any other networks, including your own, has for years been a gold-standard cybersecurity technique.Read More…