Hacker, Network security, Threats & Malware
November 20, 2019
Via: Help Net SecurityThe growth in both large- and small-scale DDoS attacks continues its upward trajectory, according to a report released by Neustar. The report reveals that the total number of DDoS attacks was up 241% in the third quarter of 2019, compared […]
May 16, 2019
Via: Dark ReadingOnline attackers are trying to obscure their encrypted traffic in an attempt to evade detection, using a technique known as “cipher stunting,” according to Internet infrastructure and security firm Akamai. Cipher stuffing modifies the fingerprint of communications encrypted with secure […]
March 5, 2019
Via: Dark ReadingInternal security teams at enterprise organizations are generally getting better at detecting compromises, but it’s still taking them well over a month to discover them. A FireEye analysis of global breach data from 2018 shows that half of all organizations […]
Network security, Threats & Malware, Virus & Malware
January 23, 2019
Via: Dark ReadingA new report on the state of malware shows a spike in B2B malware, with former banking Trojans Emotet and TrickBot topping the list. Enterprise threats ramped up toward the end of 2018 as cybercriminals shifted their strategies to hit […]
August 9, 2018
Via: Dark ReadingBLACK HAT USA – Las Vegas – A team of ICS experts who spent the past year studying and re-creating the so-called TRITON/TRISIS malware that targeted a Schneider Electric safety instrumented system (SIS) at an oil and gas petrochemical plant […]
March 30, 2018
Via: CSO OnlineRansomware detection and recovery tools and techniques are getting better. Unfortunately, so are ransomware developers. They are making ransomware harder to find and encrypted files harder to recover. One advantage that security operations have had over ransomware is that it’s […]
February 20, 2018
Via: Threat PostResearchers are warning users about the Coldroot remote access Trojan that is going undetected by AV engines and targets MacOS computers. The RAT is cross-platform and capable of planting a keylogger on MacOS systems prior to the OS High Sierra […]
Access control, Network security, Vulnerabilities
December 19, 2017
Via: Dark ReadingWhile cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats. Distributed deception platforms have grown well beyond basic honeypot trapping techniques and are designed for high-interaction deceptions, early detection, and analysis of […]
November 7, 2017
Via: CSO OnlineTracking real-world scans on systems over the first six months of 2017, Malwarebytes says that typical desktop anti-virus solutions aren’t cutting it. The company examined detection data from nearly 10 million endpoints, and discovered some of the most notable names […]
March 10, 2017
Via: MalwarebytesThe idea that there are no viruses for the Mac goes back to the beginning of Mac OS X, at the very beginning of this millennium. Most people associate this idea most strongly with the “I’m a Mac/I’m a PC” […]
November 9, 2016
Via: Security IntelligenceYes, hindsight is often 20/20. But what’s better than hindsight? Foresight. This allows you to prepare for a particular event rather than merely apply the lessons learned from a past cyberattack the next time around. Unfortunately, depending on the significance […]
October 13, 2016
Via: Help Net SecurityPrivate information stored in document files is the most popular target for attacks coming from professional hackers, according to TopSpin Security. File traps, including Office files, recent docs and deleted docs, were touched the most times during the research. The […]
September 1, 2016
Via: CSO OnlineCambridge, Mass. – As the threat landscape continues to evolve, cybersecurity experts rely more on detection and incident response, making security a collaborative exercise. But, where do they start? Many security executives used the MASSTLC Conference as a launching point. […]
July 28, 2016
Via: Help Net SecuritySolutionary found that companies in the healthcare industry had the most ransomware present, accounting for 88 percent of all ransomware detections in Q2. In addition, Cryptowall was the top ransomware variant detected during the quarter, accounting for nearly 94 percent […]
May 5, 2016
Via: Help Net SecurityIt’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even years. With increasingly sophisticated, polymorphic malware hitting enterprise networks daily — either […]
March 22, 2016
Via: CIOThe Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday. There are worries that Tor could either be […]
December 29, 2015
Via: Dark ReadingThe more vendors, service providers, and companies’ band together to fight security threats, the more difficult it will become for attacks to succeed. Security has evolved into a game of detection and response, and the greatest weapon in this new […]
November 3, 2015
Via: Help Net SecurityResearchers at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) have created a device that allows them to “see” what a person is doing and track his or her movement even if that person is located behind a wall, and […]
April 22, 2015
Via: threats-and-malwareThe Lastline Knowledge Base (LLKB) launched at the RSA Conference 2015. The new software module can be combined with the Lastline breach detection Platform to give security professionals context around incidents to respond to and defend against active breaches. The […]
April 22, 2015
Via: threats-and-malware#hp #security division is partnering with computer security company FireEye to give it a technological edge in detecting and investigating cyberattacks. FireEye’s #threat #detection and incident response capabilities will be incorporated into HP’s Enterprise Services. The companies are planning to […]