October 9, 2019
Via: The Fast ModeInternet of things (IoT) applications are transforming enterprise efficiency – but they’re also introducing new threats. As IoT apps progress toward a potential $11 trillion economic impact by 2025, businesses are increasingly benefiting from IoT-driven technology like smart labels. But […]
September 11, 2019
Via: Cisco BlogCisco Incident Response (CSIRS) recently responded to an incident involving the Watchbog cryptomining botnet. The attackers were able to exploit CVE-2018-1000861 to gain a foothold and install the Watchbog malware on the affected systems. This Linux-based malware relied heavily on […]
August 14, 2019
Via: CSOFew complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. Last year that number was a gob smacking 16,555. That’s like springing 13-45 new leaks […]
August 6, 2019
Via: CSOA worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer. It’s this ability to operate autonomously, without the need for a host file or to […]
August 5, 2019
Via: CSOJudging by last week’s Capital One breach and Equifax settlement, cybersecurity remains a topical, if not ugly, subject. The timing couldn’t be better for these unfortunate events. Why? Because the cybersecurity community gets together this week in Las Vegas for […]
August 2, 2019
Via: CSOCryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer, or by infecting a […]
Monitoring&Analysis, Security, Software
July 18, 2019
Via: CSOWhen it comes to threat detection and response, understanding network behavior really matters. According to ESG research, 87% of organizations use network traffic analysis (NTA) tools for threat detection and response, and 43% say NTA is a “first line of […]
July 16, 2019
Via: CSOComputer virus definition A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself. Like other types of malware, a virus is deployed by attackers to damage or take […]
June 10, 2019
Via: CSOSixty-three percent of IT security professionals say the frequency of attacks has gone up over the past 12 months, according to Ponemon’s 2018 State of Endpoint Security Risk report — and 52% of respondents say all attacks cannot be realistically […]
April 17, 2019
Via: CSOIT services outsourcing giant Wipro has been breached and some of its customers have been targeted by attackers as a result. Revealed by cybersecurity journalist Brian Krebs and later confirmed by the company, the attack was what Wipro described as […]
April 12, 2019
Via: CSOWhen it comes to network security, the definition of those responsibilities has greatly evolved, just as the capabilities of networking have evolved. Think of the past environments you have worked in, going back as far as your token ring or […]
April 5, 2019
Via: CSOMalware that holds data for ransom has been around for years. In 1991, a biologist spread PC Cyborg, the first ever ransomware, by sending floppy disks via surface mail to other AIDS researchers, for instance. In the mid ’00s Archiveus […]
March 22, 2019
Via: Networkworld SoftwareAs IIoT grows in prominence, so too does its status as a target for malicious hackers – particularly given its increased impact on the physical world; the latest and potentially most dangerous is called Triton. Triton first reared its ugly […]
March 1, 2019
Via: CSOThe decade-old Qbot financial malware has resurfaced with an improved version in a new attack against businesses that has infected thousands of systems so far. Researchers from data security solutions provider Varonis have uncovered the attack after a customer alerted […]
November 16, 2018
Via: Cisco BlogDetecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a patchwork of agents across the cloud surface to detect bad […]
Monitoring&Analysis, Security, Software
October 11, 2018
Via: CSOThe AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Only five of the 18 products tested earned a perfect rating of 6 for each of those criteria: Bitdefender […]
September 18, 2018
Via: CSOIn a new report, Citizen Lab researchers warned that sophisticated mobile spyware, dubbed Pegasus — made and sold by the Israeli company NSO Group — has been found not only on Androids and iPhones in countries with questionable human rights […]
September 13, 2018
Via: Cisco BlogI recently heard a news story about a survey in which people were asked whether they would prefer to the ability to fly or to be invisible. Sure, it was a silly question*, but it was interesting to hear why […]
August 29, 2018
Via: CSOOver the past several months, the FortiGuard Labs team has been tracking a number of evolving trends related to the FortiGuard 2018 Threat Landscape Predictions article published just before the beginning of the year. This mid-year update provides new details […]
June 21, 2018
Via: Cisco BlogDubbed by many as the “Year of Ransomware”, 2017 provided us with a very important and dangerous evolution to how these attacks make their way to your endpoints. The Cisco 2018 Annual Cybersecurity Report warns that “defenders should prepare to […]