April 21, 2020 Emotet Gets a Redesign to Improve Its Evasion Capabilities 2 min read - Emotet has returned with additional modules that have been specifically designed to improve the malware's evasion capabilities, a cybersecurity researcher warned.
April 20, 2020 Weekly Security News Roundup: IoT Botnet Assembled by New Mozi Malware Family 3 min read - Researchers revealed that a new malware family called Mozi is in the process of building an IoT botnet. Read on to learn what else happened last week in security news.
Endpoint April 9, 2020 Phishers and iPhone Thieves Rolling Out Multimillion-Dollar Operations 9 min read - Going down the rabbit hole of a physical iPhone theft followed by a SMiShing campaign, IBM X-Force IRIS researchers found a large-scale operation of phishers with over 600 phishing domains.
April 6, 2020 Weekly Security News Roundup: MS-SQL Servers Targeted by ‘Vollgar’ Campaign 2 min read - Researchers uncovered an attack campaign that spent the past two years targeting Windows machines running MS-SQL servers. Read on to learn what else happened last week in security news.
Identity & Access March 19, 2020 How CIAM Addresses the Challenges of Consumer Identity Management 4 min read - A consumer identity and access management (CIAM) solution can help enable secure, personalized, omnichannel interactions between consumers and brands.
March 17, 2020 Varied Functionality of MonitorMinor App Outstrips All Other Mobile Stalkerware 2 min read - Security researchers observed that the MonitorMinor app outstrips the capabilities of all other mobile stalkerware strains detected thus far.
March 16, 2020 Cookiethief: Cookie-Stealing Trojan Targets Social Media Accounts 2 min read - Researchers spotted a new cookie-stealing Trojan called "Cookiethief" that is targeting users' social media accounts and browsers.
Software Vulnerabilities March 16, 2020 Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers 6 min read - It is important that gaming companies are prepared to defend against threats to their consumers and that gamers understand the types of threats they can face in their community.
February 24, 2020 WLAN Employed by Emotet as New Distribution Method 2 min read - Security researchers discovered a new variant of the Emotet malware family that employed a wireless local area network (WLAN) as its distribution method.
Endpoint January 22, 2020 Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know 5 min read - Whether you're the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road.