In the News
Our Approach
We study attackers, so we know how to stop them.
Today’s IoT = Internet of Threats
Clients
Never Worry About IoT Cyberattacks Again
We study IoT and network hackers, so we know how to defend your systems against them then investigate who committed the crime and aid law enforcement in their capture.
-
The Ultimate Guide to Cyber Workforce Readiness in a Remote-First World
Remote work has become the norm, but cyber threats have outpaced the workforce meant to…
-
What Rising Tech Managers Need to Know About Systems Architecture
Why do promising tech projects break down just as they start gaining traction? It’s not…
-
Technical Growth Paths Built Around Modern Threat Response
Ever gotten a weird text from “Netflix Support” asking for your credit card? Or clicked…
-
The “WannaCry” Ransomware & IoT Zombies
By now you’ve probably heard about a distributed ransomware (malware that demands a ransom) known…
-
Sonorousness ransomware unmasked
Sonorousness: the latest ransomware of the S-Locker family Recently, NewSky Security received a threat sample…
-
Smart devices as Bitcoin mining slaves
Recently, we blogged about unintentionally installing Android ransomware to an Android HD media player. It is possible…































