July 20, 2017 New Devil’s Ivy Vulnerability Causing Rash of IoT Risks 2 min read - A new open source vulnerability called Devil's Ivy could enable attackers to hijack security camera feeds and block legitimate users from accessing data.
Malware July 19, 2017 TrickBot Habla Español: Trojan Widens Its Attack Scope in Spain, Brings Redirection Attacks to Local Banks 3 min read - The TrickBot Trojan has been steadily ramping up its activity this year, going into a rather intensive period of updates and attacks that started in Q2.
Intelligence & Analytics July 19, 2017 Monitor Your Network for NotPetya in Real Time 3 min read - With the QRadar NotPetya Content Pack, security analysts can monitor their networks for indicators of NotPetya ransomware in real time.
July 18, 2017 GhostCtrl Android RAT Demonstrates Spooky Range of Capabilities 2 min read - Security researchers recently uncovered a scary version of GhostCtrl, an Android RAT with advanced capabilities that can be very difficult to detect.
July 17, 2017 New Malware Gets Stronger by Using Real Apps in Banking Attacks 2 min read - New malware is infiltrating bona fide apps, making banking Trojans harder to detect. Fortunately, it can be shut down if it is detected in time.
July 17, 2017 The Adwind Remote Access Tool Experiences a Resurgence 2 min read - A new report detailed how Adwind, a remote access tool, is surging in popularity and putting countless users at risk for cyberattack.
CISO July 17, 2017 Top Cybersecurity Trends for the First Half of 2017 2 min read - Many of the most notable cybersecurity trends of the first half of 2017, such as the rapid evolution of malware techniques, will continue through the year.
Endpoint July 17, 2017 How Virus Protection Software Has Evolved With the Threat Landscape 3 min read - Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
Network July 14, 2017 The Limits of Linguistic Analysis for Security Attribution 2 min read - Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
July 13, 2017 Let’s Get Physical: Malicious Script Magecart Expands Impact With Fraudulent Mail Forwarding 2 min read - Malicious script Magecart is still going strong, allowing threat actors to hire U.S. mules to ship fraudulently purchased goods.