Dark Matters BLOG: Industry

Bribes, Bad Movies, and Le Cybergendarmes

Bribes, Bad Movies, and Le Cybergendarmes

The Month of August in 5 Articles Each Month Terbium Labs’ Research Team curates news and information from the corners of the internet to summarize the month of August in 5 articles, just for you! Research, happenings, and more related to infosecurity, cybercrime,...

C-Level Lessons: The Rising Cost of a Data Breach

C-Level Lessons: The Rising Cost of a Data Breach

INTRODUCTION The 2019 Cost of a Data Breach report is out and unsurprisingly the cost of data breaches has increased 12% over the last five years and now costs companies $3.92 million on average, globally; with smaller businesses being hit hardest because of lower...

Capital One Breached: Who’s in Your Wallet?

Capital One Breached: Who’s in Your Wallet?

INTRODUCTION Capital One was hacked on March 22 or 23, 2019 and no one at the company knew about it until an anonymous security researcher tipped them off, four months later. Even though the stolen information and information concerning it was posted explicitly on...

Laws, Questionable Fines, and Black Hat Prep?

Laws, Questionable Fines, and Black Hat Prep?

The Month of July in 5 Articles Each Month Terbium Labs’ Research Team curates news and information from the corners of the internet to summarize the month of July in 5 articles, just for you! Research, happenings, and more related to Infosecurity, cybercrime, payment...

Scrapers, Ransomware, and ID Checks – Oh My!

Scrapers, Ransomware, and ID Checks – Oh My!

The Month of June in 5 Articles Each Month Terbium Labs’ Research Team curates news and information from the corners of the internet to summarize the month of June in 5 articles, just for you! Research, happenings, and more related to infosecurity, cybercrime, payment...

Deep Dot Web Seized

Deep Dot Web Seized

The King is Dead, Long Live Decentralized Markets? On May 7th, 2019 The dark web news site, Deep Dot Web, had its website seized and administrators arrested through a coordinated effort with the U.S. FBI and European law enforcement agencies via Europol. The U.S. has...

Drugs, Espionage, Breaches, and Router Bugs

Drugs, Espionage, Breaches, and Router Bugs

The Month of May in 5 Articles The Terbium Labs’ Research Team has curated news and information from the corners of the internet to summarize the month of May in 5 articles, just for you! Research, happenings, and more related to Infosecurity, cybercrime, payment card...

International Women’s Day 2019: Balance for Better

International Women’s Day 2019: Balance for Better

Each year on March 8th, the world comes together to amplify women’s successes and advocate for women’s futures. This year, the theme of International Women’s Day is Balance for Better, a campaign designed to “celebrate women’s achievements … while calling for a more...

Security is Dead. Long Live Security.

Security is Dead. Long Live Security.

A few months ago, Andy Bochman of the Idaho National Lab published a piece in Harvard Business Review with this brutal opening paragraph. It doesn’t matter how much your organization spends on the latest cybersecurity hardware, software, training, and staff or whether...

Breach Detection Times Have Not Improved

Breach Detection Times Have Not Improved

Yesterday, Ponemon released the 2016 Cost of Data Breach Global Report. The numbers are in, and unfortunately breach detection times are still extraordinarily long. According to the report, the time to identify attacks from malicious and criminal sources (which make...

A Risk Management Approach to Information Security

A Risk Management Approach to Information Security

It’s not a matter of if, but a matter of when. In fact, when discussing data breaches, it’s not a matter of when will it happen, but a matter of when did it happen. We started Terbium with the thesis that defense, while still necessary, is no longer sufficient. In...