News


  • How the Stars are Aligning Around Zero Trust

    July 2, 2019

    The proper implementation of Zero Trust depends upon a well-defined strategy focused on a holistic approach towards protecting your data wherever it resides It’s no surprise that organizations moving to the cloud are looking at Zero Trust. Zero Trust provides a model for designing networks and systems to address the modern threat landscape. It is based ...

  • A Quick and Efficient Method For Locating the main () function of Linux ELF Malware Variants

    July 2, 2019

    Linux is a family of open source operating systems (OS) commonly used to run internet of things (IoT) devices and web servers. The prevalence of the OS, as expected, has turned it into a valuable target for cybercriminals casting wide nets to reach more potential victims. In the past few years, Linux systems have been susceptible ...

  • Phishing, ransomware are top cyberattacks on financial services firms

    July 1, 2019

    Phishing and ransomware attacks are the most reported types of cyberattacks on financial services firms, but in most cases the causes of outages were far more mundane. Financial services firms reported 819 cyber incidents to their watchdog, the Financial Conduct Authority (FCA), last year, a huge rise on the 69 incidents reported the year before. Retail banks were responsible ...

  • Island hopping: The latest security threat you should be aware of

    July 1, 2019

    While island hopping sounds like a great way to spend a holiday in Thailand or Greece, the term also refers to an advanced cyber attack technique. Though it’s not a new phenomenon, this type of attack increased in prevalence in 2018 and will likely become more and more common. The name ‘island hopping’ comes from a WWII ...

  • Germany and the Netherlands to build the first ever joint military internet

    June 28, 2019

    Government officials from Germany and the Netherlands have signed an agreement this week to build the first-ever joint military internet. The accord was signed on Wednesday in Brussels, Belgium, where NATO defense ministers met this week. The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short. This is the first time ...

  • MongoDB Leak Exposed Millions of Medical Insurance Records

    June 28, 2019

    Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com. An online database belonging to insurance marketing website MedicareSupplement.com was found exposing more than 5 million records with personal information. MedicareSupplement.com is a U.S.-based marketing site that allows users to find supplemental medical insurance available in their ...

  • New Dridex Variant Slips By Anti-Virus Detection

    June 28, 2019

    A never-before-seen Dridex variant has been spotted in phishing emails using anti-virus detection evasion tactics. Researchers have spotted a variant of the Dridex banking trojan with new obfuscation capabilities that help it skirt anti-virus detection. While Dridex has been around since 2011, researchers told Threatpost Friday that they recently spotted phishing emails distributing a never-before-seen variant of the ...

  • Android spyware campaign spreads across the Middle East

    June 27, 2019

    A new campaign has been spotted making its way across the Middle East in an effort to steal device and communications data belonging to Android users. According to new research published by Kaspersky on Wednesday, the campaign — dubbed ViceLeaker — has been active since May 2018. “Dozens” of Android devices belonging to Israeli citizens were targeted in the ...

  • Thousands of IoT Devices Bricked By Silex Malware

    June 27, 2019

    A 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week. Threatpost talks to the researcher who discovered the malware. A 14-year-old hacker used a new strain of malware this week to brick up to 4,000 insecure Internet of Things devices – before abruptly shutting down ...

  • Newly-Discovered Malware Targets Unpatched MacOS Flaw

    June 25, 2019

    Researchers have discovered never-before-seen Mac malware samples, which they believe are being developed to target a recently-disclosed vulnerability in the MacOS operating system. The vulnerability, a bypass that was disclosed in May and has yet to be patched by Apple, exists in the MacOS Gatekeeper security feature, which verifies downloaded applications before allowing them to run on Macs. ...

  • Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks

    June 25, 2019

    Cybersecurity professionals are overworked and stressed out to such an extent that it threatens to provide hackers and cybercriminals with a better chance of conducting cyberattacks against the enterprise. A study by Goldsmiths, University of London and cybersecurity company Symantec surveyed over 3,000 CISOs and senior cybersecurity decision makers across the UK, France and Germany and ...

  • Riltok mobile Trojan: A banker with global reach

    June 25, 2019

    Riltok is one of numerous families of mobile banking Trojans with standard (for such malware) functions and distribution methods. Originally intended to target the Russian audience, the banker was later adapted, with minimal modifications, for the European “market.” The bulk of its victims (more than 90%) reside in Russia, with France in second place (4%). ...

  • Anonymous hacker exposed after dropping USB drive while throwing Molotov cocktail

    June 24, 2019

    In a bizarre investigation, Belgium police have identified a member of the Anonymous Belgium hacker collective while investigating an arson case at a local bank. The perpetrator, a 35-year-old man from the Belgian city of Roeselare, was initially arrested after throwing a Molotov cocktail at the Crelan Bank office in Rumbeke, a suburb of Roeselare, back ...

  • US launches cyber-attack aimed at Iranian rocket and missile systems

    June 24, 2019

    The US has responded to a recent rise in Iranian cyber-activity and the shooting of an unarmed drone last week by launching cyber-attacks against Iran’s military IT systems. The cyber-attacks were carried out by US Cyber Command with the direct approval of US President Donald Trump, the Associated Press reported on Sunday, citing two inside sources, and ...

  • Consumers Urged to Junk Insecure IoT Devices

    June 18, 2019

    More than 2 million connected security cameras, baby monitors and other IoT devices have serious vulnerabilities that have been publicly disclosed for more than two months – yet they are still without a patch or even any vendor response. Security researcher Paul Marrapese, who disclosed the flaws in April and has yet to hear back from any impacted ...

  • Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East

    June 18, 2019

    We uncovered a cyberespionage campaign targeting Middle Eastern countries. We named this campaign “Bouncing Golf” based on the malware’s code in the package named “golf.” The malware involved, which Trend Micro detects as  AndroidOS_GolfSpy.HRX, is notable for its wide range of cyberespionage capabilities. Malicious codes are embedded in apps that the operators repackaged from legitimate ...

  • Plurox: Modular backdoor

    June 18, 2019

    In February this year, a curious backdoor passed across our virtual desk. The analysis showed the malware to have a few quite unpleasant features. It can spread itself over a local network via an exploit, provide access to the attacked network, and install miners and other malicious software on victim computers. What’s more, the backdoor ...

  • Making the Most of the NIST Cybersecurity Framework

    June 17, 2019

    The NIST Cybersecurity Framework has become a valuable tool for evaluating security across a variety of business sectors. Originally published in 2014 and targeting critical infrastructure, the framework continues to evolve to meet the changing needs of organizations in the U.S. and around the world. Its popularity stems from its thoroughness, applicability, and approachability. Our guests today are ...

  • Houdini malware targets victims with keylogger, online bank account theft tools

    June 17, 2019

    A new variant of the Houdini malware has been detected in campaigns against financial institutions and their customers. Last week, cybersecurity researchers from Cofense said in a blog post that the new strain of Houdini — also known as HWorm — was released by its author on June 2, 2019. Dubbed WSH Remote Access Tool (RAT), it took the ...

  • Game Over for GandCrab: New free decryption tool allows victims to unlock all versions of this ransomware

    June 17, 2019

    A new decryption tool that counters one of the most prolific families of ransomware by allowing victims to retrieve their files for free has been released in a collaborative effort by Europol, the FBI, cybersecurity company Bitdefender, and others. The latest version of the GandCrab decryptor neutralises the most recent incarnations of the file-locking malware – ...