Author: Dr. Christopher Kruegel

In any given attack campaign, bad actors have a specific goal in mind. This goal could involve accessing a developer’s machine and stealing a project’s source code, sifting through a particular executive’s emails, or exfiltrating customer data from a server that’s responsible for hosting payment...

Most security operation centers face an overwhelming number of security alerts every day. Limited resources make it impossible to investigate them all, and most warnings are inaccurate false positives. Effective security alert triage – the process of quickly and accurately determining the severity of a...

With the significant growth of the Android operating system, cybercriminals are increasingly using the platform for malicious purposes, and organizations can no longer ignore these threats. This post describes the most effective techniques for detecting Android-based malware, and thwarting it.  In 2017, Android overtook Microsoft Windows...