Search This Blog
Cybersecurity, cyber crisis management, and threat intel professional. Speaker, author, strong advocate for women in cybersecurity. I use my expertise and voice to provide counsel to CSOs, CISOs, and CIOs at the world’s largest corporations and governments. Volunteering: RSA Conference Hackers & Threats, Your Everyday Cyber Podcast, TLV U Interdisciplinary Cyber Research Ctr, WiCys speaker, SC Media Women in Security Awards committee, BSIDES, OWASP, Wizer security, Cyber Together.
Posts
Showing posts from 2013
Now Registering for Classes at Cybercrime U
- Get link
- X
- Other Apps
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux
- Get link
- X
- Other Apps
Is Cybercrime Ready to Crown a New KINS?
- Get link
- X
- Other Apps
¿Cómo se presenta el robo de identidad? Article in Spanish in the Colombia-based Dinero.com
- Get link
- X
- Other Apps
Bugat Joins The Mobile Revolution: BitMo Hijacking SMS-Borne OTP’s
- Get link
- X
- Other Apps
New Commercial Trojan In the Wild: Meet Beta Bot
- Get link
- X
- Other Apps
India Lost Over $18.5 Million in Phishing Attacks in 2012
- Get link
- X
- Other Apps
Zeus FaaS Comes to a Social Network Near You
- Get link
- X
- Other Apps
Phishing in Season: Tax Time Malware, Phishing and Fraud
- Get link
- X
- Other Apps
El fraude electrónico cada vez más difícil de detectar
- Get link
- X
- Other Apps
Fraude electrónico: cada vez más sofisticado
- Get link
- X
- Other Apps
Laser Precision Phishing — Are You on the Bouncer’s List Today?
- Get link
- X
- Other Apps