Security News

Cybercriminals shifting focus: IT sector most targeted in 2021
2021-12-22 03:30

Darktrace reported that the IT and communications sector was globally the most targeted industry by cybercriminals in 2021. Attackers could then launch ransomware attacks against the clients of the backup vendor, preventing recovery and forcing payment.

How MikroTik Routers Became a Cybercriminal Target
2021-12-09 15:56

Due to the sheer number of devices in use, their high power and numerous known vulnerabilities within them, threat actors have been using MikroTik devices for years as the command center from which to launch numerous attacks, researchers said. Eclypsium researchers began exploring the how and why of the weaponization of MikroTik devices in September, based on previous research into how TrickBot threat actors used compromised routers as command-and-control infrastructure.

How cybercriminals adjusted their scams for Black Friday 2021
2021-11-25 19:30

Black Friday is approaching, and cybercriminals are honing their malware droppers, phishing lures, and fake sites while shoppers prepare to open their wallets. The security firm shared a detailed report highlighting the most common threats expected to surface during this year's Black Friday, as well as the Christmas shopping season.

Cybercriminals are looking forward to 2022, so you need to plan your response now
2021-11-17 18:00

Cybersecurity firm Rapid7 is running 2022 Planning, a "Four-part webinar series to help cybersecurity teams plan for their 2022 needs." The EMEA edition features Jen Ellis, vice-president of community and public affairs at Rapid7; and Carl Nightingale, a partner in cybersecurity and digital trust at PA Consulting.

If cybercriminals can’t see data because it’s encrypted, they have nothing to steal
2021-11-16 07:30

Here's the irony of ransomware data breach stories that gets surprisingly little attention: cybercriminals enthusiastically encrypt and steal sensitive data to extort money and yet their victims rarely bother to defend themselves using the same obviously highly effective concept. If sensitive data such as IP are competently encrypted, that not only means that attackers can't access or threaten to leak it, in many cases they won't even be able to see it in the first place - all encrypted data looks alike.

Cybercriminals Target Alibaba Cloud for Cryptomining, Malware
2021-11-15 20:10

Cybercriminals are targeting Alibaba Elastic Computing Service instances, disabling certain security features to further their cryptomining goals. Alibaba offers a few unique options that make it a highly attractive target for attackers, researchers noted.

How cybercriminals use bait attacks to gather info about their intended victims
2021-11-11 14:12

With a bait attack, criminals try to obtain the necessary details to plan future attacks against their targets, says Barracuda. Cybercriminals often will research potential victims to help strategize exactly how and where to attack them.

Are you making good progress with Kubernetes? Cybercriminals are progressing faster
2021-10-06 19:00

If you're congratulating yourself on your progress adopting Kubernetes, just consider that the cybercriminals have been poring over it too. Does your Kubernetes deployment support multiple components and services across multiple nodes, all spawning data, the hijacking of which could bring your operations to a shuddering halt? Great.

Don't let cybercriminals ruin your merger or acquisition–follow this expert's advice
2021-09-28 17:07

Companies are vulnerable to potential cyberthreats during mergers and acquisitions; learn from an expert why and how to reduce security risks during the transition. Why are cybercriminals targeting companies undergoing a merger or acquisition?

Ransomware still a primary threat as cybercriminals evolve tactics
2021-09-20 04:00

Ransomware remains primary threat in the first half of the year as cybercriminals continued to target big-name victims. Working with third parties to gain access to targeted networks, they used Advanced Persistent Threat tools and techniques to steal and encrypt victims' data.