Expert Insights


Researchers from Cybereason built a “honeypot” designed to look like an electricity company with operations across Europe and North America. The honeypot network was designed to analyze the tactics, techniques, and procedures used by state-sponsored groups and cybercrime actors targeting critical infrastructure providers. The research identified multiple attackers executing ransomware […]

Honeypot Identified Multistage Ransomware Attacks


By Ian Lancaster, founder and former managing director of Reconnaissance International and lead author and editor of ‘Physical to Digital: A Revolution in Document Security’ A revolution is underway in the secured document field. Society is migrating from using physical secured documents, such as banknotes and identity cards, to the […]

Digital Document Revolution: A Cautionary Note


By Frank Baldwin, CEO 2X Systems If you’ve ever traveled by plane, you’ll know all too well how stress-inducing, tedious and often undignified going through airport security can be. In 2018, an estimated 292 million passengers traveled through UK airports alone. That’s 292 million people who would have had their bags […]

UPHOLDING SECURITY FOR GLOBAL AIRLINE PASSENGERS



By Robin Tandon, Director of Product Marketing, Cloud Solutions, HID Global The way ID cards are used in the enterprise and on college and university campuses has changed dramatically in recent years.  Once a simple identification tool, corporate ID badges now provide the means to open doors and access IT […]

ID Card Issuance Moves to the Cloud



On September 18, 2019, Trend Micro reported that they discovered a series of incidents where the credit card skimming attack Magecart was used to hit the booking websites of chain-brand hotels.  In their renowned Security Intelligence Blog they stated, “In early September, we found two hotel websites (from different hotel […]

Magecart Skimming Attack Targets Hotel Booking Websites







Apache Struts is a free, open-source, MVC framework for creating elegant, modern Java web applications. It favors convention over configuration, is extensible using a plugin architecture, and ships with plugins to support REST, AJAX and JSON. Unfortunately, unpatched Apache Struts was the point of entry for hackers who stole 145 […]

Apache Struts and Equifax – What the Experts Have To ...