December 14, 2022
Via: Dark ReadingAn analysis of threats encountered by four organizations has identified the most common techniques used by attackers to compromise systems, infiltrate networks, and steal data, according to data analysts at Splunk, which published details of the research on Dec. 14. […]
November 8, 2017
Via: Security IntelligenceWhen it comes to securing their environments, IT professionals have a critical decision to make: Should they wait until after malicious actors strike to react to security incidents, or should they address threats proactively to stop attacks before they happen? […]
March 23, 2017
Via: Dark ReadingAn analysis conducted by the New York Attorney General’s (AG) office reveals a 60% increase in data breaches in New York in 2016. This resulted in 1.6 million personal records exposed, three times the amount exposed in 2015. Main causes […]
February 28, 2017
Via: The Hacker NewsCloudflare reported last night a bug in their service which could have leaked information from the services using their edge cache servers. Feedly uses Cloudflare as a security shield which increases the reliability and performance of the Feedly web application. As […]
February 3, 2017
Via: DataBreach TodayFederal HIPAA enforcers smacked a Texas pediatric hospital with a whopping $3.2 million civil monetary penalty after investigating breaches involving unencrypted mobile devices and uncovering longstanding failures to comply with HIPAA. In a Feb. 1 statement, the Department of Health […]
February 1, 2017
Via: MalwarebytesIn this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware campaigns running called “Locky” and “Locky v2”. After some users reported being infected with Locky Bart, we investigated it […]
January 30, 2017
Via: MawarebytesSource code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with their own ideas. Recently, among the payloads delivered by exploit kits, we often find Terdot.A/Zloader – a downloader installing […]
January 26, 2017
Via: MalwarebytesVirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now. VirLocker was the first example of a mainstream polymorphic ransomware and it left no expense of misery to its […]
January 25, 2017
Via: Radware BlogLast week, I was doing research in the DarkNet marketplaces to keep on top of the current trends in the threat landscape. One of the advertisements that struck me as typical was an advertisement for a DDoS botnet for rent. […]
January 17, 2017
Via: Dark ReadingThere are all sorts of ways to curb ransomware, so why has it spread so successfully? The word “ransomware” conjures up images of dark cloaks and even darker alleys, and not surprisingly, the level of media attention has been unprecedented. […]
January 11, 2017
Via: CSO OnlineSometimes, when a network is breached, when servers are compromised, or when unencrypted data is at risk, companies will get, or even seek, assistance from government offices. The nature of cybercrime points to the ways in which our digital architectures […]
January 9, 2017
Via: MalwarebytesWe recently encountered an atypical case of Sundown EK in the wild – usually the landing page is obfuscated, but in this case there was plain JavaScript. The exploit was dropping some malicious payloads that we took for further analysis. It turned […]
December 16, 2016
Via: Dark ReadingAs we move from one year to the next, it is valuable to reflect on what has changed and what hasn’t in our areas of interest. In cybersecurity, there are two notable things that have not changed over the past […]
November 22, 2016
Via: MalwarebytesPrincessLocker ransomware has appeared some time ago and has drawn out attention by using the same template of the site for a victim as Cerber did. It is not a widespread ransomware, so it has taken some time before we […]
November 14, 2016
Via: Security AffairsRegardless of which side of the political spectrum you are on, Trump’s control over the NSA is now an indisputable fact, and we think it is worth taking a closer look at what this means. It is important to note […]
September 20, 2016
Via: Security AffairsDarknets are a privileged environment for crooks that intend to develop a prolific business protecting their anonymity, anyway, there are several aspects that they need to consider in order to leave tracks that could allow their identification. In the past […]
September 19, 2016
Via: Security IntelligenceAlthough the 2016 campaign is unique in many respects, the Donald Trump security platform largely reflects established GOP preferences on specific technology and cybersecurity issues. The platform views government regulation critically while also assigning high priority to national security regulations. […]
September 19, 2016
Via: Security IntelligenceCyber-security is not thoroughly discussed in the context of Clinton’s national security platform. And aside from a reference to “working with tech companies” to fight online propaganda, intercept communications and track social media posts, cybersecurity doesn’t play a major factor […]
August 19, 2016
Via: CIOThe disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding — and whether they should be disclosed. Security researchers have been […]
August 18, 2016
Via: MalwarebytesRecently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible attribution has led us to the conclusion that this threat is in reality not new – probably it has […]