Advertisement
Top

Tag: malware


Monitoring&Analysis, Security

Getting the Most Out of IoT Starts with Strong Cybersecurity

October 9, 2019

Via: The Fast Mode

Internet of things (IoT) applications are transforming enterprise efficiency – but they’re also introducing new threats. As IoT apps progress toward a potential $11 trillion economic impact by 2025, businesses are increasingly benefiting from IoT-driven technology like smart labels. But […]


Monitoring&Analysis, Security

Watchbog and the Importance of Patching

September 11, 2019

Via: Cisco Blog

Cisco Incident Response (CSIRS) recently responded to an incident involving the Watchbog cryptomining botnet. The attackers were able to exploit CVE-2018-1000861 to gain a foothold and install the Watchbog malware on the affected systems. This Linux-based malware relied heavily on […]


Monitoring&Analysis, Security

12 things every computer security pro should know

August 14, 2019

Via: CSO

Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. Last year that number was a gob smacking 16,555. That’s like springing 13-45 new leaks […]


Monitoring&Analysis, Security

What is a computer worm? How this self-spreading malware wreaks havoc

August 6, 2019

Via: CSO

A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer. It’s this ability to operate autonomously, without the need for a host file or to […]


Monitoring&Analysis, Security

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

August 5, 2019

Via: CSO

Judging by last week’s Capital One breach and Equifax settlement, cybersecurity remains a topical, if not ugly, subject. The timing couldn’t be better for these unfortunate events. Why? Because the cybersecurity community gets together this week in Las Vegas for […]


Monitoring&Analysis, Security

What is cryptojacking? How to prevent, detect, and recover from it

August 2, 2019

Via: CSO

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer, or by infecting a […]


Monitoring&Analysis, Security, Software

Network traffic analysis tools must include these 6 capabilities

July 18, 2019

Via: CSO

When it comes to threat detection and response, understanding network behavior really matters. According to ESG research, 87% of organizations use network traffic analysis (NTA) tools for threat detection and response, and 43% say NTA is a “first line of […]


Monitoring&Analysis, Security

What is a computer virus? How they spread and 5 signs you’ve been infected

July 16, 2019

Via: CSO

Computer virus definition A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself. Like other types of malware, a virus is deployed by attackers to damage or take […]


Monitoring&Analysis, Security

6 ways malware can bypass endpoint protection

June 10, 2019

Via: CSO

Sixty-three percent of IT security professionals say the frequency of attacks has gone up over the past 12 months, according to Ponemon’s 2018 State of Endpoint Security Risk report — and 52% of respondents say all attacks cannot be realistically […]


Monitoring&Analysis, Security

Wipro breach highlights third-party risk from large IT services providers

April 17, 2019

Via: CSO

IT services outsourcing giant Wipro has been breached and some of its customers have been targeted by attackers as a result. Revealed by cybersecurity journalist Brian Krebs and later confirmed by the company, the attack was what Wipro described as […]


Monitoring&Analysis, Security

The Modern Definition of Network Security

April 12, 2019

Via: CSO

When it comes to network security, the definition of those responsibilities has greatly evolved, just as the capabilities of networking have evolved. Think of the past environments you have worked in, going back as far as your token ring or […]


Monitoring&Analysis, Security

The 6 biggest ransomware attacks of the last 5 years

April 5, 2019

Via: CSO

Malware that holds data for ransom has been around for years. In 1991, a biologist spread PC Cyborg, the first ever ransomware, by sending floppy disks via surface mail to other AIDS researchers, for instance. In the mid ’00s Archiveus […]


Monitoring&Analysis, Security

Triton and the new wave of IIoT security threats

March 22, 2019

Via: Networkworld Software

As IIoT grows in prominence, so too does its status as a target for malicious hackers – particularly given its increased impact on the physical world; the latest and potentially most dangerous is called Triton. Triton first reared its ugly […]


Monitoring&Analysis, Security

Qbot malware resurfaces in new attack against businesses

March 1, 2019

Via: CSO

The decade-old Qbot financial malware has resurfaced with an improved version in a new attack against businesses that has infected thousands of systems so far. Researchers from data security solutions provider Varonis have uncovered the attack after a customer alerted […]


Monitoring&Analysis, Security

Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud

November 16, 2018

Via: Cisco Blog

Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a patchwork of agents across the cloud surface to detect bad […]


Monitoring&Analysis, Security, Software

The best antivirus software? Kaspersky, Bitdefender and Microsoft lead in latest tests

October 11, 2018

Via: CSO

The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Only five of the 18 products tested earned a perfect rating of 6 for each of those criteria: Bitdefender […]


Monitoring&Analysis, Security

Sophisticated mobile spyware Pegasus found in the US and 44 other countries

September 18, 2018

Via: CSO

In a new report, Citizen Lab researchers warned that sophisticated mobile spyware, dubbed Pegasus — made and sold by the Israeli company NSO Group — has been found not only on Androids and iPhones in countries with questionable human rights […]


Monitoring&Analysis, Security

In Pursuit of Invisibility: Fileless Malware

September 13, 2018

Via: Cisco Blog

I recently heard a news story about a survey in which people were asked whether they would prefer to the ability to fly or to be invisible. Sure, it was a silly question*, but it was interesting to hear why […]


Monitoring&Analysis, Security

The Evolving Threat Landscape – Swarmbots, Hivenets, Automation in Malware

August 29, 2018

Via: CSO

Over the past several months, the FortiGuard Labs team has been tracking a number of evolving trends related to the FortiGuard 2018 Threat Landscape Predictions article published just before the beginning of the year. This mid-year update provides new details […]


Monitoring&Analysis, Security

Secure your Endpoints Against Ransomware: Introducing Malicious Activity Protection

June 21, 2018

Via: Cisco Blog

Dubbed by many as the “Year of Ransomware”, 2017 provided us with a very important and dangerous evolution to how these attacks make their way to your endpoints. The Cisco 2018 Annual Cybersecurity Report warns that “defenders should prepare to […]