Cybercriminals are increasingly using supply chain attacks to distribute malicious software to devices. In this type of attack, attackers gain access to a company's account on a, such as GitHub, which is used to store source code and software files. The attackers then upload a malicious software package that looks...
Malware families can contain multiple variants, each with different capabilities, delivery methods, or evasion techniques.
As the threat landscape evolves, threat actors constantly improve their malware families to evade detection and achieve their objectives. They may add new features, exploit new vulnerabilities,...
If "time is money," why spend it on all of those little tasks in a SOC that can add up, eating away at valuable workday hours? Automating these repetitive, low-level activities can free up valuable time so you can focus on more strategic initiatives, such as threat hunting and improving the overall security...
Cybersecurity automation can make a dramatic difference in both team performance and costs. However, calculating tangible ROI on purchases can be difficult. And quantifying ROI is critical to buy-in from leadership.
This guide shows that when choosing a SOAR platform, make sure it meets your current automation...
By analyzing real-world telemetry data, the second annual Elastic Global Threat Report provides principal insights from Elastic’s dedicated security intelligence team, including:
An in-depth look at threat telemetry specific to Elastic
Observations of malware signatures, endpoint behavior, cloud provider...
Android banking Trojan Xenomorph has resurfaced in a new campaign targeting cryptocurrency wallets and various financial institutions. The malware has been actively targeting users in Europe and is now focused on institutions in the United States, Canada, Spain, Italy, Portugal and Belgium.
With the rise of social engineering, large organizations continue to fall for credential-based phishing attacks, which often lead to costly breaches. Traditional multi-factor authentication (MFA) methods are increasingly under attack, and are especially prone to phishing. Join us to learn how to combat...
In Elastic Security Labs' inaugural threat report, explore threat phenomena and trends, gleaning recommendations to help you prepare for the future of cybersecurity. Learn about the latest malware research, attack patterns, and clusters of malicious activity from a team of seasoned threat researchers working with a...
To some extent, ransomware has become like COVID-19 - a threat we all need to learn to live alongside. But Aaron Bugal, field CTO of Sophos, says there is still much that security and technology leaders can do to reduce their risk by addressing activity that often precedes a ransomware attack.
Booking and reservation systems, as well as slot machines, hotel room door locks, ATMs and more remain offline at multiple MGM Resorts properties as the publicly traded casino hotel giant battles "a cybersecurity issue" that one group of security researchers has tied to a ransomware group attack.
According this report, the rate of ransomware attacks has remained steady. Sixty-six per cent of research respondents said their organization was hit by ransomware in the previous year. With adversaries now able to consistently execute attacks at scale, ransomware is arguably the biggest cyber risk facing...
According to the latest Sophos State of Ransomware report, there is a ransomware pandemic infecting businesses across the Asia Pacific region.
Ransomware is like COVID-19 – a threat that all businesses need to learn to live with.
In this e-book, Sophos’ Field CTO for Asia Pacific Aaron Bugal discusses with...
BumbleBee is a malware loader that specifically targets Windows computers. Initially discovered in March 2022, it has marked over a year of continuous evolution since its emergence. Since its early stages, BumbleBee was under active development. With consistent refinement and the integration of new features, the...
A backdoor Trojan known as SmokeLoader is deploying a customized Wi-Fi scanning executable to triangulate the location of infected Windows devices. The malware, dubbed "Whiffy Recon," uses nearby Wi-Fi access points as a data point for Google's geolocation API.
In the latest weekly update, ISMG editors discuss important cybersecurity and privacy issues including highlights of interviews at Black Hat 2023, lessons learned from the success of the Lapsus$ cybercrime group's attacks and why Check Point is buying startup Perimeter 81 for $490 million.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.