Security News

Why Does Data Exfiltration Remain an Almost Unsolvable Challenge?
2018-03-27 11:20

From hacked IoT devices to corporate infrastructures hijacked for crypto-mining to automated ransomware, novel and sophisticated cyber-attacks are notoriously hard to catch. It is no wonder that...

Top cybersecurity evasion and exfiltration techniques used by attackers
2018-03-23 12:30

SS8 released its 2018 Threat Rewind Report, which reveals the top cybersecurity evasion and exfiltration techniques used by attackers and malicious insiders. During the past year, SS8 sensors and...

Iran-linked Hackers Adopt New Data Exfiltration Methods
2018-03-22 15:30

An Iran-linked cyber-espionage group has been using new malware and data exfiltration techniques in recent attacks, security firm Nyotron has discovered.   The threat actor, known as OilRig, has...

Android Trojan Leverages Telegram for Data Exfiltration
2018-03-21 16:02

A newly discovered Android Trojan is abusing Telegram’s Bot API to communicate with the command and control (C&C) server and to exfiltrate data, Palo Alto Networks security researchers warn....

Stealthy Data Exfiltration Possible via Headphones, Speakers
2018-03-13 10:15

A team of researchers has demonstrated how air-gapped computers can stealthily communicate with each other using speakers or headphones over ultrasonic waves. read more

Stealthy Data Exfiltration Possible via Magnetic Fields
2018-02-08 06:25

Researchers have demonstrated that a piece of malware present on an isolated computer can use magnetic fields to exfiltrate sensitive data, even if the targeted device is inside a Faraday cage. read more

Will explosive data exfiltration continue in 2018?
2018-01-24 13:00

Last year was a banner year for cybercrime. More data was stolen in the first six months of 2017 than in the entirety of 2016. Gemalto’s Breach Level Index found that over 900 data breaches...

Common Infiltration, Exfiltration Methods Still Successful: Report
2017-12-05 14:21

Many organizations are still having difficulties protecting their systems against the most common infiltration, exfiltration and lateral movement methods used by attackers, according to the latest...

Data exfiltration tool PTP-RAT encodes data in pixel colour values
2017-11-10 17:35

How to exfiltrate data from a machine that doesn’t have file transfer capabilities or whose Remote Desktop Protocol (RDP) connection has been locked down, making it impossible to send files?...

Week in review: Email tracking, DNS exfiltration, and secure coding in Java
2017-10-09 01:10

Here’s an overview of some of last week’s most interesting news and articles: Leaving employees to manage their own password security is a mistake Despite the clear and present danger that weak...