Security News

How to protect yourself from the hidden threat of evasive scripts
2020-09-07 04:00

Scripts can also be used for malicious purposes, and malicious scripts are unlikely to be detected or blocked by the average antimalware solution. While Emotet is one example of threat that uses scripts as part of its evasive strategy, there are many other types of script-based evasion techniques organizations need to be aware of to keep their systems secure.

iProov launches system of global threat intelligence for biometric assurance
2020-09-04 02:30

iProov has launched the world's first system of global threat intelligence for biometric assurance. iSOC's threat intelligence provides forewarning of major new attacks and enables iProov to prepare and defend against them.

Netskope Cloud Threat Exchange: Enabling real-time sharing of threat intelligence in the cloud
2020-09-04 02:00

Netskope announced the Cloud Threat Exchange, one of the industry's first cloud-based solutions for the ingestion, curation, and real-time sharing of threat intelligence across enterprise security enforcement points. Any certified, partner, vendor, or customer may use Cloud Threat Exchange to automate the delivery and distribution of high-value, actionable threat intelligence, thus reducing the time to protection and eliminating gaps in coverage.

Triple-Threat Cryptocurrency RAT Mines, Steals and Harvests
2020-09-02 20:11

A previously undocumented malware family called KryptoCibule is mounting a three-pronged cryptocurrency-related attack, while also deploying remote-access trojan functionality to establish backdoors to its victims. Looking at timestamps in the various versions of KryptoCibule that ESET has identified, the malware dates from December 2018, researchers said.

How insider threats pose risks and challenges to any organization
2020-09-02 14:10

As organizations try to defend themselves against external threats, they need to remember that insider threats can also cause harm. A report released Wednesday by security provider Bitglass shines a light on the ramifications of insider threats and offers advice on how to use the right security features to combat them.

We Need Better Classification of Threat Intelligence
2020-09-02 10:46

Some intelligence services focus their efforts on identifying threat actor groups and attack methods, informing their customers whether they are targeted or not. Some terms are beginning to emerge to better define intelligence offerings, with the most prominent one being Digital Risk Protection, or DPO. While it is used by many vendors to describe services designed to identify external threats, it does often time seem to include the traditional "Threat intelligence" as part of the vendor's offering, such as malware IOCs, blurring the lines between the two terms.

Ransomware attacks continue to dominate the threat landscape
2020-09-01 17:47

Ransomware attacks often rely on trojans to infect computers and steal information. As ransomware continues to dominate as a cyberthreat, criminals are increasingly carrying out attacks using Cobalt Strike, an otherwise ethical testing framework.

It's Not Just an Unusual Login: Why Pay Attention to Threats Facing SaaS and Cloud?
2020-08-31 14:08

More attention should be dedicated to strange login times and locations so that cloud and SaaS account compromises do not result in company-wide damage. Since the unusual login location was accompanied by an unusual login time, the actions triggered a deeper analysis from my team.

Qualys Multi-Vector EDR: Protection across the entire threat lifecycle
2020-08-31 04:30

How does Qualys Multi-Vector EDR differ from traditional EDR solutions? Qualys Multi-Vector EDR leverages the strength of EDR while also extending the visibility and capabilities beyond the endpoint to provide a more comprehensive approach to protection.

Malicious Attachments Remain a Cybercriminal Threat Vector Favorite
2020-08-27 12:00

While attachment threat vectors are one of the oldest malware-spreading tricks in the books, email users are still clicking on malicious attachments that hit their inbox, whether it's a purported "Job offer" or a pretend "Critical invoice." The attack vector is still widespread enough where tech giants are re-inventing new ways to try to stomp it out, with Microsoft just this week rolling out a feature for Office 365 that aims to protect users against malicious attachments sent via email, for instance.