Threat Intelligence Blog

Posted January 5, 2016

We publish this weekly threat intelligence brief keep you informed on the latest security incidents and threats. For security news throughout the day, follow us on Twitter. Subscribe to our blog to stay up-to-date on findings from our analyst research reports!

Financial Services

“[A Chicago-based hotel operator] revealed that it recently discovered malicious computer code on computers used for processing payments at locations it manages. In a short statement, [the hotel] did not disclose what, if anything, the cyber attack accomplished but said that the company immediately “launched an investigation and engaged leading third-party cyber security experts.””

Legal and Regulations

The Internal Revenue Service (IRS) clarified that it would not consider the value of credit monitoring and other identity protection services provided by employers to employees in connection with a data breach to be taxable income to the employees (IRS Announcement 2015-22). In response to comments, the IRS expanded this tax treatment to apply when employers provide such services before a breach happens (IRS Announcement 2016-02).



“Operation Black Atlas, a campaign aimed at infecting point of sale (PoS) systems around the world, has managed to infect more companies and is using the modular Gorynych/Diamond Fox botnet to exfiltrate data […] researchers warn. Earlier this month, the security company revealed that cybercriminals were using multiple tools to compromise businesses that use card payment systems, including those in healthcare and retail, and to infect targeted systems with various PoS malware, including the BlackPOS malware.”

– Security Week


“The Pentagon is considering increasing the pace and scope of cyberattacks against [certain targets], arguing that more aggressive efforts to disable the extremist group’s computers, servers and cellphones could help curtail its appeal and disrupt potential terrorist attacks. Military hackers and coders at Cyber Command, based at Fort Meade, Md., have developed an array of malware that could be used to sabotage the militants’ propaganda and recruitment capabilities, said U.S. officials, who were not authorized to speak publicly on internal discussions.”

Los Angeles Times

Additional Posts

How Online Impersonators Can Harm Your Brand and Reputation

  By Olga Polishchuk Social media platforms have quickly grown into global communities and a ...

A Costly Reminder: Third Party Risk Management is Critical

We’ve all heard time and time again how important insight into third parties (or the supply ...