threat-intelligence-insights

Microsoft Internet Explorer 8 Misses Over Two Thirds of Newly Discovered Phishing Attacks

Last month Cyveillance released the Cyveillance Intelligence Report for the 1st half of 2009. As a ...
threat-intelligence-insights

Inside the Development and Management of a Botnet

A story published recently by a researcher at Cisco does a great job of illustrating what it takes ...
threat-intelligence-insights

Cyveillance Testing Finds Leading AV Vendors Not Keeping Pace with Influx of Malware and Phishing Attacks

Antivirus and Anti-Phishing Tools Provide Inadequate Detection of Cyber Attacks During Critical ...
threat-intelligence-insights

Phishers Continue to Innovate

In a recent phishing attack discovered by Cyveillance, cyber criminals used an individual Web site ...
threat-intelligence-insights

Software Updates Used as Phishing Bait

Phishers have been targeting software updates to distribute malicious software (malware). In the ...
threat-intelligence-insights

Cyveillance Identifies Dangerous “Maltweets” on Twitter

Cyber criminals are leveraging high profile current events and Twitter to distribute malicious ...
threat-intelligence-insights

The Ever-Growing Threat from Cyber Criminals

A story by the San Francisco Chronicle posted on www.sfgate.com earlier today sheds light on the ...
threat-intelligence-insights

ICANN’s Registry-Registrar Cross Ownership Proposal is a Bad Idea

The public interest in supporting competition and protecting end-users does not support elimination ...
phishing

LookingGlass sees phishing attacks against ISPs on the rise

During the past couple of weeks Cyveillance has noticed an increase in the amount of phishing ...
threat-intelligence-insights

Cyveillance’s Approach to Cyber Security Validated by Recent Obama Administration Initiative

For years now Cyveillance has been the cyber intelligence leader, emphasizing a proactive approach ...