Blog Posts Tagged with "malware"
Android RAT Exclusively Targets Brazil
September 02, 2019 Added by:Ionut Arghire
A newly discovered Android remote access Trojan (RAT) is specifically targeting users in Brazil, Kaspersky reports.
Comments (0)
On the Horizon: Parasitic Malware Will Feast on Critical Infrastructure
June 04, 2019 Added by:Steve Durbin
Unprepared organizations will have a wide (and often unmonitored) attack surface that can be targeted by parasitic malware.
Comments (0)
The Rise of Ransomware and the Consequences for SMBs
February 21, 2019 Added by:Timur Kovalev
Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.
Comments (0)
'DarkGate' Campaign Targets Europeans with Multiple Payloads
November 16, 2018 Added by:Ionut Arghire
A newly discovered malware campaign is targeting users in Europe with various payloads, has a reactive command and control (C&C) system and can remotely control infected machines, enSilo security researchers warn.
Comments (0)
Fight Fileless Malware on All Fronts
November 06, 2018 Added by:Phil Richards
Fileless malware has become the darling of cyber criminals because, quite simply, it’s a no-brainer.
Comments (0)
Lessons from Cyber Essentials – Going Back to the Basics
October 11, 2018 Added by:Andrew Avanessian
IT leaders across all organisations should be working to weave in the Cyber Essentials scheme into the fabric of their businesses.
Comments (0)
It's Time to Get Real about Complex, Emerging Threats
September 12, 2018 Added by:Steve Durbin
Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.
Comments (0)
FIN6 Hackers Update Arsenal of Techniques
September 11, 2018 Added by:Ionut Arghire
A cybercriminal group focused on stealing payment card data records has been using new tactics, techniques and procedures (TTPs) in attacks observed in 2017 and 2018, IBM X-Force security researchers report.
Comments (0)
Why the World Needs Disruptive, Effective, Modern Cyber Protection
August 28, 2018 Added by:Boris Vaynberg
Companies need to look for a solution that strengthens their cyber defenses dramatically by preventing attacks before they enter and harm their organization, their customers and their brand.
Comments (0)
Researchers Detail Linux-Based “Chaos” Backdoor
February 20, 2018 Added by:Ionut Arghire
A Linux-targeting backdoor observed in live attacks in June last year was recently found to have been part of an older rootkit, GoSecure researchers reveal.
Comments (0)
Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures
December 14, 2017 Added by:Liviu Arsene
Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.
Comments (0)
Healthcare Orgs in the Crosshairs: Ransomware Takes Aim
November 03, 2017 Added by:Sanjay Ramnath
Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.
Comments (0)
Managing Cyber Security in Today’s Ever-Changing World
October 26, 2017 Added by:Steve Durbin
The contours of cybercriminal enterprise have grown to become specialized, like that of mainstream business, operating out of conventional office spaces, providing a combination of customer support, marketing programs, product development, and other trappings of the traditional business world.
Comments (0)
Ztorg Trojan-SMS Infects Google Play Apps
June 24, 2017 Added by:Ionut Arghire
Newly discovered Google Play applications infected with the Ztorg Trojan family no longer request root privileges on compromised devices, Kaspersky Lab security researchers reveal.
Comments (0)
Neutrino Bot Gets Protective Loader
March 07, 2017 Added by:Ionut Arghire
A recently observed variant of the multi-purpose Neutrino Bot is using a protective, obfuscated loader that is an integral part of the full package.
Comments (0)
DynA-Crypt Ransomware Steals and Deletes User Data
February 11, 2017 Added by:Ionut Arghire
A newly observed piece of ransomware doesn’t merely focus on encrypting user’s files, but also attempts to steal data from the infected machine, and to delete files, researchers warn.
Comments (0)
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider
- SecurityWeek Extends ICS Cyber Security Conference Call for Presentations to August 31, 2020