1. P

    Use Cases of a SIEM and How to implant a SIEM

    Hi there! I have to make a final master project and I would like to get some information about these things: 1. Use case to implant a SIEM, por instance: CASO | CATEGORIA | DEFINICIÓN | FUENTE | EPS Detectar USB infectado | malware | Caso para detectar... | "endpoint" | 44 2. As well I need...
  2. Andra Zaharia

    International Computer Fraud, Forgery and Money Laundering Ring Dismantled

    I have to say, I LOVE good news like this one! On 15 November, prosecutors from the Romanian Territorial Office Vâlcea of the Directorate for Investigating Organized Crime and Terrorism (DIICOT), acting within a joint investigation team (JIT) set up with the support of Eurojust, carried out an...
  3. J

    Turkish Internet Servers Reeling Under Huge Cyber Attack!

    Turkish Internet servers are suffering a powerful cyber attack, slowing banking services and fanning fears that it could be a politically motivated attack from abroad. Nic.tr, a non-governmental organization that administers addresses for websites using the "tr" domain, said Thursday that the...
  4. frogboy

    How online fraud will evolve in 2016

    While 2015 is drawing to a close, the security fraud community is preparing for more battles ahead in 2016. And next year, consumer-facing web and mobile apps are up against a much more sophisticated and prolific enemy as bad actors continue to evade traditional security defenses, leverage the...