Written By David Bisson

Enterprises Using IaaS or PaaS Have 14 Misconfigured Instances on Average, Cloud Adoption Study Finds

A cloud adoption report found that companies that deploy infrastructure-as-a-service (IaaS) or platform-as-a-service (PaaS) have an average of 14 misconfigured instances running at a given time.

Destructive Attacks Spike in Q3, Putting Election Security at Risk

Nearly one-third of incidents reported in Q3 were classified as "destructive attacks," according to a recent report, putting election security at risk leading up to the 2018 midterms.

DemonBot Targeting Hadoop Clusters to Perform DDoS Attacks

Security researchers reported that a new bot called DemonBot is targeting Hadoop clusters to execute distributed denial-of-service (DDoS) attacks.

Cybercriminals Distribute TimpDoor Malware to Turn Android Devices Into Network Proxies

The TimpDoor malware family enables cybercriminals to turn infected Android devices into network proxies without users' knowledge.

Fraudsters Abuse Trusted Web Services to Conduct Phishing Attacks

Researchers reported that threat actors are using web services such as Google Drive, SharePoint and Dropbox to host files containing malicious links as part of phishing campaigns.

New Campaign Uses RTF Files to Drop Agent Tesla Trojan and Other Malware

A new attack campaign is using Rich Text Format (RTF) files to distribute the Agent Tesla Trojan along with other malware.

GPlayed Android Trojan Imitates Google Apps to Spy On and Steal Data From Victims

Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.

New Gallmaker Attack Group Using Living-off-the-Land Tactics in Espionage Campaign

A new attack group known as Gallmaker spied on military and government organizations by employing living-off-the-land tactics.

KeyBoy Attacker Group Uses Publicly Available Exploit Code to Deliver Malware

The KeyBoy attacker group recently used known exploit code for two Microsoft security flaws to infect machines with TSSL and Titan Android malware, according to AlienVault.

iTranslator Malware Installs Two Drivers to Perform a MitM Attack

Researchers from FortiGuard Labs discovered a malware sample called iTranslator that installs two drivers onto infected machines to perform man-in-the-middle (MitM) attacks.