Advertisement
Top

Tag: Threat


Vulnerabilities

Kaspersky Security Bulletin: Threat Predictions for 2019

November 21, 2018

Via: Securelist

There’s nothing more difficult than predicting. So, instead of gazing into a crystal ball, the idea here is to make educated guesses based on what has happened recently and where we see a trend that might be exploited in the […]


Malware

USB threat vector trends and implications for industrial operators

November 2, 2018

Via: Help Net Security

In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to transfer patches, updates and files to those systems. But that choice is not devoid of […]


Malware

Chalubo, a new IoT botnet emerges in the threat landscape

October 24, 2018

Via: Security Affairs

Security experts from Sophos Labs have spotted a new piece of IoT malware tracked as Chalubo that is attempting to recruit devices into a botnet used to launch DDoS attacks. Security experts from Sophos Labs have spotted a new piece […]


Cloud security, Security

Race to the Cloud Creates Security Complexity

October 9, 2018

Via: Symantec Connect

Cloud computing has gone mainstream as more organizations shift their applications and workloads from on-premise data centers to public cloud platforms. Almost every company in the world—96 percent, according to one annual survey[1]—has moved some part, if not the majority, […]


Malware, Network security

VPNFilter Evolving to Be a More Dangerous Threat

September 27, 2018

Via: Dark Reading

VPNFilter malware is adding capabilities to become a more fully-featured tool for threat actors. Malware writers are finding greater efficiencies by reusing older code families. That explains why VPNFilter — the attack that caused the FBI to recommend that everyone […]


Malware

USB threats from malware to miners

September 25, 2018

Via: Securelist

In 2016, researchers from the University of Illinois left 297 unlabelled USB flash drives around the university campus to see what would happen. 98% of the dropped drives were picked up by staff and students, and at least half were […]


Network security

Data Manipulation: How Security Pros Can Respond to an Emerging Threat

September 24, 2018

Via: Dark Reading

Industry leaders are scrambling to address the issue, which will take new thinking to overcome. This year, the US government paid out its largest bug bounty yet — during the government-run “Hack the Air Force” program — for a vulnerability […]


Phishing, Vulnerabilities

Threats posed by using RATs in ICS

September 20, 2018

Via: Securelist

While conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In a number of incidents that we have investigated, threat actors […]


Application security, Cloud security, Network security

Expect API Breaches to Accelerate

August 8, 2018

Via: Dark Reading

APIs provide the digital glue that binds apps, cloud resources, app services and data altogether – and they’re increasingly an appsec security threat. Last year the category of underprotected APIs cracked the OWASP Top 10 list for the first time. […]


Network security

How Can an ISAC Improve Cybersecurity and Resilience?

July 16, 2018

Via: Security Intelligence

Sharing computer security threat information is now an established practice in IT. Whether automatically or manually, the primary motivator to pool resources is to improve your own capabilities and those of your peers for responding to security threats and incidents. […]


Network security

Putin Pushes for Global Cybersecurity Cooperation

July 9, 2018

Via: Dark Reading

At a Moscow-based security conference, Russian President Vladimir Putin said countries should work together amid the rise of cyberthreats. Russian President Vladimir Putin called on countries to better cooperate in the fight against cyberattacks during his address at a Moscow […]


Network security

New Federal Report Gives Guidance on Beating Botnets

June 1, 2018

Via: Dark Reading

A report from the Departments of Commerce and Homeland Security provides five goals for protecting infrastructure from botnets and other automated threats. In May 2017, the Trump administration issued Executive Order 13800, “Strengthening the Cybersecurity of Federal Networks and Critical […]


Malware

Is Cryptojacking Replacing Ransomware as the Next Big Threat?

May 24, 2018

Via: Security Week

Monitoring cyberthreats over time reveals interesting insights into the strategies used by cybercriminals and the evolution of the attack vectors they target. While the threat landscape continues to be quite diversified, trends do seem to run in predictable cycles. For […]


Hacker

SamSam explained: Everything you need to know about this opportunistic group of threat actors

April 18, 2018

Via: CSO Online

The first version of the SamSam (a.k.a. Samas or SamsamCrypt) ransomware was developed and released in late 2015 by a group of threat actors believed to reside in Eastern Europe. The group itself is mostly a mystery, but the code […]


Hacker, Virus & Malware

Cryptomining, not ransomware, the top malware threat so far this year

April 18, 2018

Via: CSO Online

Cyptominer-based attacks, not ransomware-based attacks, have been the top threat so far this year, according to Comodo Cybersecurity Threat Research Labs’ Q1 Global Malware Report. In the first three months of 2018, Comodo said it “detected 28.9 million cryptominer incidents […]


Network security, Threats & Malware

FBI chief signals need to understand potential threats tied to cryptocurrency

March 8, 2018

Via: The Hill

FBI Director Christopher Wray on Wednesday said the bureau must be prepared to confront a new set of emerging cyber threats. “The digital environment presents new challenges that the FBI has to address in terms of what’s coming down the […]


Editorial

Combatting the Growing Threat of Ransomware

February 14, 2018

Via: itCurated

Given the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the […]


Malware

Local governments grapple with ransomware threat

December 8, 2017

Via: The Hill

Computers hackers are increasingly targeting local governments with cyberattacks for financial gain. Hackers this week successfully infected government servers with malware in North Carolina, locking Mecklenburg County officials out of their systems and slowing its operations to a crawl. Hackers […]


Malware, Threats & Malware

Kaspersky Security Bulletin: Threat Predictions for 2018

November 17, 2017

Via: Securelist

As hard as it is to believe, it’s once again time for our APT Predictions. Looking back at a year like 2017 brings the internal conflict of being a security researcher into full view: on the one hand, each new […]


Vulnerabilities

Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening

November 2, 2017

Via: Security Intelligence

Very little in life grabs our attention like a shiny new object. The gleam can be irresistible, the glitter mesmerizing. That’s how it is in cybersecurity, where the landscape is almost always dotted with alluringly novel hazards. Brand new threats, […]