Search This Blog
Cybersecurity, cyber crisis management, and threat intel professional. Speaker, author, strong advocate for women in cybersecurity. I use my expertise and voice to provide counsel to CSOs, CISOs, and CIOs at the world’s largest corporations and governments. Volunteering: RSA Conference Hackers & Threats, Your Everyday Cyber Podcast, TLV U Interdisciplinary Cyber Research Ctr, WiCys speaker, SC Media Women in Security Awards committee, BSIDES, OWASP, Wizer security, Cyber Together.
Posts
Showing posts from 2018
Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers
- Get link
- X
- Other Apps
The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion
- Get link
- X
- Other Apps
IBM X-Force Delves Into ExoBot’s Leaked Source Code
- Get link
- X
- Other Apps
CamuBot: New Financial Malware Targets Brazilian Banking Customers
- Get link
- X
- Other Apps
BackSwap Malware Now Targets Six Banks in Spain
- Get link
- X
- Other Apps
Anubis Strikes Again: Mobile Malware Continues to Plague Users in Official App Stores
- Get link
- X
- Other Apps
Goal! Spam Campaigns Capitalize on the World Cup Craze
- Get link
- X
- Other Apps
Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware
- Get link
- X
- Other Apps
XMRig: Father Zeus of Cryptocurrency Mining Malware?
- Get link
- X
- Other Apps
TrickBot’s Cryptocurrency Hunger: Tricking the Bitcoin Out of Wallets
- Get link
- X
- Other Apps
Necurs Spammers Go All In to Find a Valentine’s Day Victim
- Get link
- X
- Other Apps
IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity
- Get link
- X
- Other Apps
CPU Vulnerability Can Allow Attackers to Read Privileged Kernel Memory and Leak Data
- Get link
- X
- Other Apps