April 28, 2022
Via: CSOA computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself. Like other types of malware, a virus is deployed by attackers to damage or take control of a […]
April 6, 2022
Via: CSOMalware authors are keeping with the times and when it comes to server-oriented malware. Specifically, attackers will adopt the same technologies their target organizations are using. Security researchers have recently come across a cryptocurrency miner that was designed to run […]
February 14, 2022
Via: CSOMalware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs attackers use to wreak destruction and gain access to sensitive information. The key point is that malware is identified as such based […]
May 24, 2021
Via: CSOWhen hacking began many decades ago, it was mostly the work of enthusiasts fueled by their passion for learning everything they could about computers and networks. Today, nation-state actors are developing increasingly sophisticated cyberespionage tools, while cybercriminals are cashing in […]
May 13, 2021
Via: CSODarkSide is a ransomware threat that has been in operation since at least August 2020 and was used in a cyberattack against Georgia-based Colonial Pipeline, leading to a major fuel supply disruption along the East Coast of the US. The […]
May 12, 2021
Via: The Fast ModeOver the past few years, ransomware has posed one of the greatest cybersecurity threats to organizations across the globe. Today, most experts would likely agree that ransomware poses the single biggest threat. Ransomware impacts all types of organizations – public […]
April 12, 2021
Via: The Fast ModeAccording to a report by Coleman Parkes, half of mobile consumers think COVID-19 has increased cyberthreats. Perception isn’t always reality – but in this case it is – and will only continue to worsen. In 2021, it is projected that […]
February 23, 2021
Via: CSOWith the pandemic turning the business world upside down, offices look less like hives of activity and more like ghost towns. Employees have had to make do with working from home, a dangerous proposition from the perspective of any risk-averse […]
September 29, 2020
Via: CSOThe science and technology behind vulnerability management has changed a lot in a short time. When originally deployed, vulnerability management companies acted almost like antivirus vendors in that they tried to get their scanners to uncover as many potential threats […]
September 10, 2020
Via: CSODuring times of uncertainty, people look for answers. Unfortunately for IT security professionals, that means these days employees fall victim to cyberattacks all too often. Attackers have taken advantage of the current state of affairs and are exploiting everyone’s desire […]
August 27, 2020
Via: CSOThe Qbot Trojan has been plaguing computer users and businesses for over a decade and the cybercriminals behind it are still coming up with new tricks that keep it one of the most prevalent and successful malware threats. The latest […]
Monitoring&Analysis, Security, Wireless
June 12, 2020
Via: Networkworld SecurityAs many part of the U.S. are at least partially lifting lockdown sanctions prompted by the COVID pandemic, questions about the safety of those moves remain. IoT technology, however, might help alleviate some of those concerns. The degree to which […]
January 31, 2020
Via: Cisco BlogToday, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan 24 and Jan 31. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve […]
Monitoring&Analysis, Security, Software
December 18, 2019
Via: CSODuring the holiday shopping season, online businesses are counting on a spike in online traffic. Web advertising is in place, new products have been posted, and shopping carts are ready for an influx of returning customers and new shoppers. What […]
December 12, 2019
Via: CSOMaking cybersecurity predictions is fun, but not necessarily helpful to security professionals who must decide which threats for which they should be the most prepared. “You can’t really make a good prediction about what the future’s going to hold because […]
December 9, 2019
Via: CSOMidyear reports showed a 54 percent increase in breaches over last year with more than 4 billion records compromised. The year is ending with news about breaches impacting customers of Macy’s and T-Mobile. Disney’s new streaming service, Disney+, wasn’t even […]
December 5, 2019
Via: Cisco BlogIt isn’t hard to imagine the havoc a physical attack on an oil and gas operation can wreak. But few pause to consider the extent of damage that can be achieved with cyberattacks alone. Be it malware taking over control […]
November 27, 2019
Via: CSOThe night before I was to give a eulogy at my mother’s memorial service, I was smished. As someone who regularly writes about cybersecurity, I’m not usually duped by a cybercriminal’s tricks. But I was in a highly emotional state […]
Monitoring&Analysis, Security, Software
October 29, 2019
Via: CSOWhile nearly 9 in 10 companies not only allow, but actually rely on their employees to access critical business apps using their personal devices, according to a recent Fortinet Threat Landscape Report, Android-based malware now represents 14% of all cyberthreats. […]
Monitoring&Analysis, Security, Wireless
October 24, 2019
Via: CSORepresentative Mike Rogers (R-AL), ranking member of the House Homeland Security Committee, had a lot of thoughts to share during and after a speech he gave at the CyberTalks conference today. Most timely among Rogers’ positions is the notion that […]