October 3, 2017 Cybercriminals Use Legitimate VMware Binary to Create New Malware Threat 2 min read - Cisco Talos discovered a new banking Trojan that exploits an authentic VMware binary to hide its malicious activities from security researchers.
October 2, 2017 Malware Mines Monero on Vulnerable Servers 2 min read - Security researchers reported that threat actors have been targeting vulnerable servers to mine for cryptocurrency since about May 2017.
September 28, 2017 Thermal Security Camera Flaws Could Let Cybercriminals Launch Remote Attacks 2 min read - Cybercriminals could launch remote attacks through thermal security camera vulnerabilities. The flaw, first found in FLIR, could also expose other systems.
Network September 27, 2017 What Do Recent Attacks Mean for OT Network Security? 11 min read - Cyberattacks such as WannaCry, NotPetya and Industroyer wreaked havoc on organizations, but they provided lessons for security your OT network.
September 26, 2017 Ransomware Threat Means IT Managers Cannot Afford to Get Locky 2 min read - Locky ransomware is a rising threat again as millions of spam emails have been sent out in a new series of attacks.
Endpoint September 25, 2017 Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks 2 min read - Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
September 21, 2017 Report Shows Cybercrime Is Cheaper and More Accessible Than Ever 2 min read - A SecureWorks study revealed that cybercrime tools are widely available and cost less than what consumers may imagine.
September 21, 2017 Report: Employees Outpace Fraudsters as Source of Cybersecurity Threats 3 min read - According to a recent survey, trusted employees, not cybercriminals, are responsible for the majority of cybersecurity threats affecting SMBs.
September 20, 2017 New Banking Malware Poses Fresh Risk to Android Users 2 min read - A new banking malware called Red Alert 2.0 poses a significant threat to Android users. The Trojan leverages third-party apps to steal data.
September 19, 2017 Security Utility Abuses Supply Chain for a Malware Attack 2 min read - CCleaner was compromised at the main distribution site to include a malware attack. The Floxif attack is a downloader that breached the app supply chain.