Blog
SEC Issues Cybersecurity and Resiliency Observations
The Securities and Exchange Commission, the US agency in charge of regulating securities laws, stock market exchanges and investments, issued a report on Cybersecurity and Resiliency Observations.
Hackers Exploit Coronavirus Fear In Latest Phishing Email Campaign
Phishing emails disguised as “coronavirus updates” are being used to lure victims into downloading malicious attachments
State of NY Plans to Ban Ransomware Payments
In the last few weeks, New York state senators have proposed two bills to ban local municipalities and other government entities from using taxpayer money for paying ransomware demands.
Merry Christmas from EMOTET Malware
One more wave of spam mail transporting Emotet malware at Christmas holidays. Previous Emotet campaigns were arrived via banking-related emails, this spear-fishing wave pretends to be greeting you that offered to select something you will bring and for you to wear...
Hackers Targeting Small E-Commerce Businesses This Holiday Season
This holiday season, hackers are using the surge in online shopping and lack of defenses to launch cyberattacks on small e-commerce businesses.
Fake Sexual Harassment Complaints Used As Bait In Latest Phishing Attacks
Phishing emails disguised as sexual harassment complaints being sent by the federal agency US Equal Employment Opportunity Commission (EEOC) are being used to deliver the TrickBot banking Trojan.
Hackers: Targeting Business Companies in IT and Healthcare Sectors
Several businesses in Germany, Italy, and the United States targeted by new group of hackers. This group attempt to infect business users with backdoor, banking Trojan, or ransomware malware in phishing campaign. These campaigns are not customized for each enterprise...
Racoon Stealer: Info-Stealing Trojan Gaining Popularity
Easy to use trojan malware is gaining popularity, as it allows cyber criminals to steal credit card data, passwords and cryptocurrency. Raccoon Stealer, a trojan malware, has already infected hundreds of thousands of Windows users in numerous countries. The first...
US Navy: Effective Cybersecurity Requires Persistent Presence
"In nearly eight years as Secretary of the Navy, I faced a steep challenge on how to manage cyber threats at the pace of 8 million attempted intrusions a day in an organization of 900,000 people" - Ray Mabus, Secretary of Navy As Secretary of the Navy, I spent a lot...
Malicious Word document tricks recipients to download and install the Emotet Trojan
The Emotet botnet recently introduced a new technique to infect end users. Emotet uses a malicious MS Word template received through attachment that pretends to be a Microsoft Office Activation Wizard. Actors behind Emotet will use malicious Word document templates...
Survey: Human Error Greatest Threat to Firms
600 organizations were polled on the major security issues they will face in the next 12 to 18 months. Human error was atop the list.
Microsoft Outlook Limits Productivity By Blocking 104 File Attachments
Outlook has blocked sending & receiving emails that include 104 attachments. Businesses must choose between safety and producitivity. Or must they?
IBM Security: USA, Healthcare and Small Businesses Felt Breaches The Most
In 2019, the USA, healthcare and small businesses had the highest breach costs, when compared to peers.
Why Mimecast Spent $88M To Acquire Solebit’s CDR Technology
Mimecast classified Solebit as a “technology acquisition”. We look at what this means and how it justifies the $96M price tag.
Cybersecurity Companies Were Completely Unprepared For This Drastic Change
Malware distribution has shifted from exploit kits to email attachments. With phishing distribution vector here to stay, a secure solution is needed to fill the current void
Cybersecurity Industry Leaning On Acquisitions to Fuel Growth
Cybersecurity M&A activity has been on the rise as larger players are looking to expand product portfolios and drive growth
Retailers and Others With Point-Of-Sale (POS) Systems Latest Target of Cybercime
Stolen credit card information is sold on for profit on dark web underground forums. It all starts with a phishing email….
Spreadsheet Script Went Undetected in Siemens’ System For Two Years
A former Siemens third party contractor is facing 10 years in prison, a fine of $250,000, or both after pleading guilty to planting logic bombs inside spreadsheets he created for the company. According to court documents, David Tinley, 62, provided software services...
Spike in Fileless Campaign Highlights Ineffectiveness of AntiVirus
The attackers delivering Astaroth have been at it for quite a while and the techniques they use are obviously successful enough for them to make just minor modifications.
Microsoft Discovers New Excel-Based Attack to Deliver Malware
Microsoft Discovers New Excel-Based Attack to Deliver the FlawedArmmyRAT Malware
Latest Chinese Cyber Attacks Highlight Downside of Relying on Market Leaders Like Microsoft and Google
Reuters reported that Chinese hackers broke into the systems of 8 major IT service providers, highlighting the seismic disruption when relying on a few providers.
SEC Guidelines Place Cybersecurity Center Stage
The SEC now expects public companies to report material cybersecurity incidents AND potential security risks in all necessary filings.