Threats & Malware, Virus & Malware
March 21, 2024
Via: Help Net Security93% of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47% last year, according to Thales. The number of enterprises experiencing ransomware attacks surged by over 27% in the past year. Despite this […]
July 7, 2022
Via: Help Net SecurityUnidentified cyber threat actors have started using Brute Ratel C4 (BRc4), an adversary simulation tool similar to Cobalt Strike, to try to avoid detection by endpoint security solutions and gain a foothold on target networks, Palo Alto Networks researchers have […]
Threats & Malware, Vulnerabilities
January 12, 2021
Via: Help Net SecurityWith the growing threat of fraud fueled by the digital acceleration that took place in 2020, Experian revealed five emerging fraud threats facing businesses in 2021. The rapid increase in digital use created a perfect storm for fraudsters to quickly […]
January 6, 2021
Via: CSO OnlineAdvanced Persistent Threats (APTs) have long been a concern of the cybersecurity community. Well-organized teams with significant resources and targets they are not willing to give up attacking until their mission is accomplished are certainly not a threat to be […]
Data loss, Hacker, Threats & Malware
August 3, 2020
Via: Security AffairsThe US-based interior design web site Havenly has disclosed a data breach after the known threat actor ShinyHunters has leaked for free the databases of multiple companies on a hacker forum. Last week, BleepingComputer reported that ShinyHunterswas offering on a […]
March 3, 2020
Via: CSO OnlineThreat hunting – proactively searching through your own company’s networks to hunt for attacks that might evade other security measures – often signifies a company with a mature and well-resourced security organization. But just as threat actors are constantly evolving, […]
Cloud security, Security, Vulnerabilities
December 19, 2019
Via: Threat PostWhen it comes to facing insider threats, many enterprises seem to be suffering from a type of organizational cognitive dissonance – as in, they hold two, seemingly contradictory beliefs when it comes to the cloud and the collaboration tools that […]
November 22, 2019
Via: Help Net SecurityComing off of a year of major data breaches making headline news, it’s easy to draw the conclusion that security teams are losing the cybersecurity battle, a DomainTools survey reveals. Security teams remain confident Security pros are reporting real progress […]
Malware, Mobile security, Vulnerabilities
November 11, 2019
Via: Threat PostBig businesses are constantly under attack, and that affects everyone from customers and business partners to parties with national security interests. When successful, the initial compromise is only a means to an end — the real goal is to mount […]
October 23, 2019
Via: Help Net SecurityData security is a legitimate worry for today’s consumers around the world, Ping Identity survey reveals. Approximately one half (49%) of respondents report that they are more concerned about protecting their personal information than they were one year ago. This […]
October 14, 2019
Via: Help Net SecurityInsider threat is, unfortunately, an issue that has not yet received sufficient priority. According to the 2018 Deloitte-NASCIO Cybersecurity Study, CISOs’ top challenges remain “budget, talent and increasing cyber threats,” and to some, insider threat doesn’t even make the list […]
Hacker, Threats & Malware, Vulnerabilities
October 11, 2019
Via: The HillA bipartisan group of senators is calling for all branches of government to share information on threats to technology supply chains, citing potential risks to national security. In a Wednesday letter to Office of Management and Budget Director Mick Mulvaney, […]
October 10, 2019
Via: Hot for SecurityThe volume of ransomware attacks is declining, but law enforcement agencies are observing a more targeted approach from criminals seeking lucrative victims. The latest Europol report shows how companies became more exposed in 2018 and 2019. Europol (The European Union […]
Hacker, Threats & Malware, Vulnerabilities
September 16, 2019
Via: Threat PostResearchers have identified a new threat actor that is using impersonation fraud to purchase digital certificates that are then used for the spread of malware. Security firm ReversingLabs identified a bad actor that deceives certificate authorities into selling them legitimate […]
Cyber-crime, Email security, Malware, Phishing, Security
August 27, 2019
Via: Threat PostResearchers have identified a never-before-seen threat group targeting Middle East critical infrastructure organizations with novel malware, sent via spearphishing emails. The threat group, LYCEUM, was observed in 2019 sending spear phishing emails harboring malicious Microsoft Excel attachments to oil and […]
July 23, 2019
Via: CSO OnlineMobile security is at the top of every company’s worry list these days — and for good reason: Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive info out of the wrong hands is […]
July 12, 2019
Via: Help Net SecurityBusinesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, a study from the Capgemini Research Institute has found. Two thirds (69%) of organizations acknowledge that they will not be able to […]
Cyber-crime, Mobile security, Phishing
July 11, 2019
Via: Help Net SecurityFinancial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “Mobile Security in the Financial Services,” includes analysis of six months of security data from 225 financial services customers with 50,000 devices collectively under management. Notable […]
Cyber-crime, Malware, Mobile, Mobile security
July 4, 2019
Via: Dark ReadingWannaLocker, a mobile lookalike of the infamous WannaCry ransomware, just got a little more dangerous. Researchers at Avast this week reported observing a new version of the malware that combines WannaCry’s user interface with new spyware, a banking Trojan, and […]
June 6, 2019
Via: Help Net SecurityIn the age of big data, it is easy to think that only machines can detect a signal amid the noise. While it’s true that big data tools can discover signals that might not be obvious, they can also create […]