Good news for Microsoft Windows users: The Equation Group exploit tools dumped this month by Shadow Brokers don't work against currently supported versions of Windows, largely thanks to patches Microsoft released in March. But who tipped off Microsoft?
It used to be that cybercriminals would blindly cast a wide net, sending millions of fraudulent emails in the hope that a few people would be tricked into handing over their personal or financial information. Today, targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built...
Hybrid clouds represent the new normal for data centers, which, in turn, warrants a new security model that needs to be grounded in an understanding about what is different about cloud infrastructure. IT and security professionals are well aware of the need to retool for this new normal.
Given strong adoption of...
Cyberattackers love not having to reinvent the wheel. At least, that's the tactic favored by the Callisto group, an "advanced threat actor" that's been using leaked Hacking Team spyware to infect targets, says security firm F-Secure.
Concern about privacy spurs consumers to work more closely with their banks, says Robert Zerby, vice president and financial crimes manager within the Community Banking Risk Management division at Wells Fargo Financial Crimes Risk Management.
Leading the latest version of the ISMG Security Report: A tale of how a dedicated manager spent her weekends monitoring video of ATMs led to the capture of a criminal skimmer. Also, the growing sophistication of cybercriminals.
The first quarter of 2017 brought with it some significant changes to the threat landscape, and we aren't talking about heavy ransomware distribution either. New threats and infection techniques have forced the security community to reconsider collection and analysis efforts.
This report takes a deep look at which...
This eBook introduces the advanced cybersecurity practice of threat hunting and the role it plays in protecting your organization. Find out how security experts always stay one step ahead of even the most sophisticated attackers.
Learn how threat hunting works, why it's an essential component in an organization's...
Non-malware attacks, artificial intelligence (AI), and machine learning (ML) have emerged as the topics du jour in cybersecurity. AI and ML's roles in preventing cyberattacks have been met with both hope and skepticism. They have been marketed as game-changing technologies though doubts still persist, especially when...
In 2016, there were two contenders for king of ransomware: Locky and Cerber. So far in 2017, we've seen a massive shift in the battle between these two families, with Locky basically dropping out entirely and Cerber expanding its market share by a significant amount. New families such as Spora are emerging as well,...
March saw the arrival of a new, so-called "Fappening/ Celebgate" scandal, where leaked images and videos of naked celebrities found their way onto the web...prime real estate for scammers who started peddling numerous links across sites like Reddit and all social networks. Likewise in February, Fortune reported a tech...
When she first joined the Los Angeles County district attorney's office, Maria Ramirez prosecuted street gangs. Now she's cracking down on cyber gangs and is opening her case file to share lessons learned from cases involving business email compromise and ransomware.
The recent fix for a zero-day flaw in Microsoft Office appeared more than five months after Microsoft was privately alerted to the flaw, and followed months of it being exploited via in-the-wild attacks. Can Microsoft do better?
Cyberattacks are evolving at a much faster pace than the traditional security solutions can adapt to...so we must run to catch up. Machine learning and artificial intelligence (AI) assist a behavioral model of threat detection in an industry-leading alternative to traditional methods of endpoint security test suites....
Monetarily motivated attacks are by far the most prevalent cyberthreats to organizations worldwide, yet vulnerability management techniques have largely failed to adapt to a threat landscape dominated by distributed crimeware. By understanding the commercialization of attack tools and services - particularly the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.