threat-intelligence-insights

Microsoft Internet Explorer 8 Misses Over Two Thirds of Newly Discovered Phishing Attacks

Last month Cyveillance released the Cyveillance Intelligence Report for the 1st half of 2009. As a ...
threat-intelligence-insights

Inside the Development and Management of a Botnet

A story published recently by a researcher at Cisco does a great job of illustrating what it takes ...
threat-intelligence-insights

Cyveillance Testing Finds Leading AV Vendors Not Keeping Pace with Influx of Malware and Phishing Attacks

Antivirus and Anti-Phishing Tools Provide Inadequate Detection of Cyber Attacks During Critical ...
threat-intelligence-insights

Phishers Continue to Innovate

In a recent phishing attack discovered by Cyveillance, cyber criminals used an individual Web site ...
threat-intelligence-insights

Software Updates Used as Phishing Bait

Phishers have been targeting software updates to distribute malicious software (malware). In the ...
threat-intelligence-insights

Cyveillance Identifies Dangerous “Maltweets” on Twitter

Cyber criminals are leveraging high profile current events and Twitter to distribute malicious ...
threat-intelligence-insights

The Ever-Growing Threat from Cyber Criminals

A story by the San Francisco Chronicle posted on www.sfgate.com earlier today sheds light on the ...
threat-intelligence-insights

ICANN’s Registry-Registrar Cross Ownership Proposal is a Bad Idea

The public interest in supporting competition and protecting end-users does not support elimination ...
threat-intelligence-insights

Cyveillance’s Approach to Cyber Security Validated by Recent Obama Administration Initiative

For years now Cyveillance has been the cyber intelligence leader, emphasizing a proactive approach ...
threat-intelligence-insights

Cyveillance is very pleased to be part of QinetiQ North America portfolio

Cyveillance is extremely excited to become the latest addition to QinetiQ North America ...