July 22, 2019 MegaCortex Ransomware Uses Aggressive Ransom Notes to Coerce Payments 2 min read - Researchers analyzed a sample of the MegaCortex ransomware family that used an aggressive ransom note to bully victims into meeting their demands.
July 10, 2019 Zoom Vulnerability Could Let Third Parties Take Over Webcams 2 min read - A zero-day Zoom vulnerability could allow third parties to snoop on videoconferencing calls, reactivate uninstalled apps and conduct other malicious activities.
July 3, 2019 Godlua Backdoor Capable of Performing DDoS Attacks 2 min read - Both versions of the Godlua backdoor, discovered in late April, are capable of performing distributed denial-of-service (DDoS) attacks, according to a new report.
July 1, 2019 Attack Campaign Leverages B2B Site to Distribute New Spelevo Exploit Kit 2 min read - A recent attack campaign leveraged a business-to-business (B2B) website to distribute a new exploit kit named Spelevo.
Endpoint July 1, 2019 Technology, the Enterprise or the User: Which Owns Mobile Security? 4 min read - To best manage mobile security within your enterprise, you need to maintain balance between technology, enterprise and user responsibilities.
Endpoint June 25, 2019 Is Your Endpoint Protection Strategy Ready for 5G? 5 min read - If you accept that 5G technology comes with three inherent challenges — manageability, the supply chain and usage — then the endpoint protection challenge makes a whole lot more sense.
CISO June 21, 2019 3 IoT Security Considerations for Operational Technology Environments 3 min read - The increasing connectedness of tools and devices is expanding the threat surface and introducing IoT security risks to operational technology environments.
June 18, 2019 InterPlanetary Storm Malware Using IPFS P2P Network to Hide Its Activities 2 min read - A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.
Intelligence & Analytics June 17, 2019 How to Take Advantage of Alarming Cybersecurity News 3 min read - The security industry does a thorough job of conveying the latest cybersecurity news, albeit sometimes to the detriment of the people whose job it is to set security priorities.
June 11, 2019 Attack Campaign Exploits CVE-2019-2725, Abuses Certificate Files to Deliver Monero Miner < 1 min read - Researchers observed an attack campaign exploiting CVE-2019-2725 and abusing certificate files to deliver a Monero miner.