Enterprises catching up with the explosion of cloud use and shadow IT in the workplace
Businesses worldwide are gaining control of previously unmonitored and unsupported cloud applications and devices, known as shadow IT, that lurk in their IT environments, …
The pervasive use of second screens endangers corporate IT networks
Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed …
A fileless campaign is dropping the Astaroth info-stealer
Attackers are delivering the Astaroth info-stealing backdoor by leveraging a combination of fileless malware and “living off the land” techniques, …
Anatomy of a ransomware attack: How attackers gain access to unstructured data
Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and …
Cybercriminals leverage malicious Office docs, Mac malware, web app exploits
There’s been a 62% increase in overall malware detections in Q1 2019 compared to the previous quarter. A new WatchGuard report also found that cybercriminals are …
Eurofins ransomware attack affected UK police work
Eurofins, a global provider of scientific testing services, said on Monday that operations are returning to normal after the recent ransomware attack, but that its impact on …
How past threats and technical developments influence the evolution of malware
If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution …
Botnets shift from Windows towards Linux and IoT platforms
Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …
Smart home security devices most at risk in IoT-targeted cyber attacks
Smart home security cameras equate to 47% of the most vulnerable devices followed by smart hubs such as Googlehome, Amazon Alexa, with the top countries executing attacks …
Malware peddlers hit Office users with old but reliable exploit
Emails delivering RTF files equipped with an exploit that requires no user interaction (except for opening the booby-trapped file) are hitting European users’ inboxes, …
Criminals are selling hacking services targeting world’s biggest companies
A new study – undertaken by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and underwritten by Bromium – provides details of first-hand …
Researchers fight ransomware attacks by leveraging properties of flash-based storage
Ransomware continues to pose a serious threat to organizations of all sizes. In a new paper, “Project Almanac: A Time-Traveling Solid State Drive,” University of …