June 2018

Despite tough US sanctions, North Korea’s leaders have gotten their hands on the latest products from companies such as Apple and Microsoft, according to a new report. US cybersecurity firm Recorded Future tracked how people access the internet from North Korea. It found that the country’s ruling elite uses Microsoft (MSFT) Windows and Apple (AAPL) […]

A well-known Russian cyber-espionage group has subtly changed its modus operandi, moving to what security researchers from Palo Alto Networks are calling “parallel attacks.” These new “parallel attacks” are in stark contrast with what security researchers from multiple cyber-security firms have previosuly seen from Sofacy, a well-known APT (advanced persistent threat —a term used to […]

On the heels of a reported U.S. deal with embattled Chinese telecom company ZTE, American lawmakers rejected a Democratic measure that would have directed the Department of Homeland Security to provide more information on any cybersecurity risks posed by the international tech company. The top Republican and Democrat on the House Homeland Security Committee sparred […]

Israeli cybersecurity company DocAuthority today announced the completion of a $10 million Series A fimnancing round led by Raine Ventures and with the participation of Greycroft, ffVC, Differential VC in the US, and 2B Angels and Plus Ventures in Israel. DocAuthority will use the financing to accelerate its growth, extend its reach into new markets […]

THE KEY Former Trump campaign chairman Paul Manafort after a court hearing on May 23 in Washington. (Photo: Mark Wilson/Getty Images) Federal prosecutors say they’ve gotten their hands on a batch of potentially incriminating texts that Paul Manafort, the former Trump presidential campaign chairman, sent through encrypted messaging apps to two potential witnesses in his conspiracy and […]

The digital transformation in government IT is driving modernization but also expanding the attack surface Federal agencies have to protect. The traditional perimeter no longer exists. Today, there is no “inside” or “outside” the network when it comes to detecting, defending, and deterring cyber attacks. With rapid modernization, an expanding attack surface, and an ever-changing […]