Security News

Ursnif Trojan Uses Fileless Persistence and CAB for Stealthily Data Exfiltration
2019-01-26 16:21

In addition to employing a fileless attack technique, the Ursnif Trojan has been using CAB files to compress harvested data before exfiltration in recent attacks, Cisco Talos security researchers...

G Suite warns admins about domain data exfiltration attempts
2019-01-09 15:04

Google has rolled out new options for the G Suite alert center, to help administrators battle phishing emails more efficiently and spot data export operations initiated by attackers. The new...

Researchers Use Smart Bulb for Data Exfiltration
2018-11-26 18:55

Researchers with software risk measurement and management company Checkmarx were able to create two mobile applications that abuse the functionality of smart bulbs for data exfiltration. read more

PageUp Breach: 'No Specific Evidence' of Data Exfiltration
2018-11-26 09:33

But Forensic Investigation Shows Attackers Had Exfiltration Tools in PlaceAustralian human resources software developer PageUp says it has found "no specific evidence" that attackers removed data,...

NFCdrip Attack Proves Long-Range Data Exfiltration via NFC
2018-10-18 17:35

Researchers have demonstrated that the near-field communication (NFC) protocol can be used to exfiltrate small amounts of data, such as passwords and encryption keys, over relatively long...

Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
2018-10-02 14:49

The free online office suite software is used by more than 30 million people and is a ripe target for criminals.

Preventing exfiltration of sensitive docs by flooding systems with hard-to-detect fakes
2018-09-14 13:34

A group of researchers from Queen’s University (Canada) have proposed a new approach for keeping important documents safe: creating so many believable fakes that attackers are forced either to...

PageUp: No Sign of Data Exfiltration
2018-06-19 12:48

But Old Error Logs Contained Clear Text of Incorrect PasswordsHuman resources software developer PageUp says it doesn't appear that personal data exposed in a malware attack was actually removed...

Why Does Data Exfiltration Remain an Almost Unsolvable Challenge?
2018-03-27 11:20

From hacked IoT devices to corporate infrastructures hijacked for crypto-mining to automated ransomware, novel and sophisticated cyber-attacks are notoriously hard to catch. It is no wonder that...

Top cybersecurity evasion and exfiltration techniques used by attackers
2018-03-23 12:30

SS8 released its 2018 Threat Rewind Report, which reveals the top cybersecurity evasion and exfiltration techniques used by attackers and malicious insiders. During the past year, SS8 sensors and...