All posts in Cybersecurity

Learn how to protect your organization and users from this Android banking trojan. Image: Adobe Stock Nexus malware is an Android banking trojan promoted via a malware-as-a-service model. The malware has been advertised on several underground cybercrime forums since January 2023, as reported in new research from Cleafy, an Italian-based . . . Read more

GitHub wants you to protect your account with the right type of authentication. Image: Rubaitul Azad/Unsplash GitHub is now prompting developers and administrators who use the site to secure their accounts with two-factor authentication. The move toward two-factor authentication for all such users officially started on March 13 and will . . . Read more

Addressing cybersecurity can be a challenge when the focus is on speed in software development and production life cycles. Image: Murrstock/Adobe Stock The push to innovate and create can often drive software developers to move at breakneck speed to deliver new apps, updates and bug fixes — a frenetic pace . . . Read more

Image: CROCOTHERY/Adobe Stock In Cisco’s new Cybersecurity Readiness Index, only 15% of respondents to the global survey said their organizations have implemented security programs mature enough to defend against current cybersecurity risks. While most enterprises have some collection of cybersecurity measures deployed, a full 82% of the 6,700 chief information . . . Read more

Microsoft has already seen millions of phishing emails sent every day by attackers using this phishing kit. Learn how to protect your business from this AitM campaign. Image: dvoevnore/Adobe Stock New research from Microsoft’s Threat Intelligence team exposed the activities of a threat actor named DEV-1101, which started advertising for . . . Read more

New report says far too many firms have too many IT assets they cannot see or aren’t using, with some Windows servers lacking endpoint protection and patch management. Image: Askha/Adobe Stock If you are lucky enough to have a Lambo in your garage, you’ll surely have cameras at least on . . . Read more

The harassment reported by Palo Alto Networks Unit 42 typically takes the form of phone calls and emails directed toward employees, C-suite executives and even customers. Image: PR Image Factory/Adobe Stock Ransomware groups are pulling no punches in their attempts to force compromised organizations to pay up. A report released . . . Read more

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by threat actors. Image: Adobe Stock Cybersecurity defenders peering into the fog hoping to catch a glimpse of the . . . Read more
20 Mar, 2023
Blockchain, cloud, Cryptocurrency, cryptojacking, Cybersecurity, dero, Docker, Innovation, Kubernetes, Monero, networking, Security, Security News
0

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat. Image: Pixabay The cybersecurity company CrowdStrike has observed the first-ever Dero cryptojacking campaign. The attack targets Kubernetes clusters that were accessible on the internet and allowed anonymous access to . . . Read more
17 Mar, 2023
access management, Credential Theft, CXO, Cybersecurity, data risks, data theft, Insider threats, Security, Security News, Zero Trust
0

Some 12% of employees take customer details, health records, sales contracts and other confidential data when leaving a company, according to DTEX. Image: Feodora/Adobe Stock A former employee could try to sell account credentials from their previous employer over the dark web. A current employee could record a confidential presentation . . . Read more