Saturday , June 6 2020
Home / Hot Topics / Security

Security

SophosLabs Research About Netwalker Ransomware Reveals Cybercriminal’s Toolbox

A few years ago ransomware criminals typically used what’s called the “spray-and-pray” approach – or what might more appropriately be called “spray-and-prey”, given the entirely predatory nature of these attacks. A ransomware gang might have emailed a malicious attachment to ten million people, relying on ten thousand of them opening it up and getting scrambled, and then banking (figuratively and ...

Read More »

Kaspersky Announces Online Training Solutions for Employees to Boost Security Awareness

Kaspersky has unveiled its new Kaspersky Adaptive Online Training, developed in partnership with Area9 Lyceum. The solution generates a security awareness curriculum that is tailored to each individual user’s learning needs, as a personal tutor would do for their students. The content for this new enterprise-grade solution is based on Kaspersky’s cybersecurity expertise and delivered in accordance with modern learning ...

Read More »

GBG Predator Improves Fraud Detection for Credit Card, Mobile, Digital Payments and More

GBG announced its expansion of AI and machine learning capabilities for its transaction and payment monitoring solution, Predator, making deep learning and predictive analytics available to their entire digital risk management customer journey. GBG first announced its machine learning capabilities for Instinct Hub, their digital onboarding fraud management system in January this year. The new AI capability additionally processes third party data — device ...

Read More »

New Research by Trend Micro Highlights Changing Market Trends For Cybercrime Products And Services

Trend Micro Incorporated released new data on cybercriminal operations and patterns for buying and selling goods and services in the underground. Trust has eroded among criminal interactions, causing a switch to e-commerce platforms and communication using Discord, which both increase user anonymization. “This report highlights the threat intelligence we collect and analyze from global cybercriminal networks that enables us to alert, ...

Read More »

Ragnar Locker Ransomware Hides Inside a Virtual Machine: SophosLabs

SophosLabs published details of a sophisticated new ransomware attack that takes the popular tactic of “living off the land” to a new level. To ensure their 49 kB Ragnar Locker ransomware ran undisturbed, the crooks behind the attack bought along a 280 MB Windows XP virtual machine to run it in (and a copy of Oracle VirtualBox to run that). It’s almost ...

Read More »

Tenable’s VP Commented on New Cyber Espionage Campaign Codenamed “Ramsay”

Security researchers from ESET recently discovered a new cyber espionage campaign codenamed “Ramsay” – a malware designed to steal data from air gapped networks separated from the internet or other online systems. According to the researchers, the Ramsay malware has the ability to infect computers that are isolated from the network, collect Word, PDF, and ZIP files in a hidden folder and ...

Read More »

CERT-India Releases Advisory About “EventBot” Mobile Banking Malware

In light of CERT-India’s recent advisory that a mobile banking malware called “EventBot”, can steal personal financial information and prompt users to give access to their device accessibility services. Adam Palmer, Chief Cybersecurity Strategist at Tenable comments, “Eventbot is a typical malware designed to steal data of financial applications on a victim’s phone. As organisations merge personal technology with corporate devices, these are one of many ...

Read More »

SonicWall Capture Labs Threat Research Team Uncovered A New Malware That Targets Browsers Applications

SonicWall Capture Labs Threat Research Team has recently unearthed a new variant of Raccoon stealer (V1.5). It has been used in a malicious COVID-19 campaign. Similar to several other attacks, this campaign also begins with a phishing mail posing to carry information on how to deal with the outbreak of Covid-19. The mail then encourages the users to open the attached ...

Read More »

CISA, FBI Releases a List of Top 10 Routinely Exploited Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. Government released a list today of the top 10 vulnerabilities most commonly exploited by foreign cyber actors. Exploitation of these vulnerabilities often requires fewer resources compared to zero-day exploits for which no patches are available. Here’s a comment from Satnam Narang, Staff Research Engineer at Tenable providing an analysis of ...

Read More »

37% Organizations Use More Than 100 Cybersecurity Products to Address Security Issues: Oracle Survey

Data security is creating fear and trust issues for IT professionals, according to the third-annual Oracle and KPMG Cloud Threat Report 2020. The study of 750 cybersecurity and IT professionals across the globe found that a patchwork approach to data security, misconfigured services and confusion around new cloud security models has created a crisis of confidence that will only be fixed ...

Read More »