Search results

'Disgruntled insider' shared REvil information with researchers, helped law enforcement

by AJ Vicens

REvil was among the most notorious ransomware crews until international attention and arrests hobbled the group.

North Korea aims 'TraderTraitor' malware at cryptocurrency workers

by Tonya Riley

The Cybersecurity and Infrastructure Security Agency is attributing the campaign to hackers known as the Lazarus Group.

CrowdStrike, Mandiant announce 'strategic partnership'

by Joe Warminsky

CrowdStrike's Falcon platform will be integrated into Mandiant's services for existing customers. More crossover is planned later this year.

Private equity firm that created Trellix spins off another cyber business, Skyhigh Security

by Joe Warminsky

Skyhigh is essentially the last piece of the puzzle created by Symphony Technology Group's shakeup of several big cybersecurity brands.

SentinelOne to acquire identity security firm Attivo Networks for $616.5M

by Joe Warminsky

The acquisition of Attivo Networks "is a natural platform progression" for SentinelOne, said COO Nicholas Warner.

Google has 'definitive agreement' to buy Mandiant for $5.4B

by Joe Warminsky

The all-cash deal for Mandiant comes after the company only recently became independent again.

Inside the numbers of another big year for cyber mergers, acquisitions and investments

by Joe Warminsky

As budgets for cybersecurity services increase, investors continue to pump money into the industry. And innovation by startups is perpetually drawing attention.

Trellix, McAfee, FireEye, Mandiant: What's next for four big names in cyber

by Joe Warminsky

With the arrival of Trellix, there was a lot of talk about integrating pieces of McAfee and FireEye. But in some ways, the move represents disintegration, too.

Is the Groove ransomware gang is a motley crew of disgruntled hackers, or a hoax?

by Tim Starks

The group emerges as cracks form in the ransomware-as-a-service model.

Researchers show how to tamper with medication in popular infusion pumps using software flaws

by Sean Lyngaas

The research illustrates the challenge of securing devices conceived decades ago from 21st-century digital threats.

TwitterFacebookLinkedInRedditGmail