Are your organization’s key assets at risk?

A new study conducted by the Ponemon Institute shows increases in threats and awareness of threats to knowledge assets, as well as improvements in addressing those threats by the highest performing organizations.  Awareness of the risk to knowledge assets increased as more respondents acknowledged that their companies very likely failed to detect a breach involving knowledge […]

This cryptocurrency mining malware also disables your security services

A new form of cryptocurrency mining malware uses a leaked NSA-exploit to spread itself to vulnerable Windows machines, while also disabling security software and leaving the infected computer open to future attacks. The Python-based malicious Monero miner has been uncovered by researchers at security company Fortinet who’ve dubbed it PyRoMine. It first appeared this month and […]

Most dangerous attack techniques, and what’s coming next

Experts from SANS presented the five most dangerous new cyber attack techniques in their annual RSA Conference 2018 keynote session in San Francisco, and shared their views on how they work, how they can be stopped or at least slowed, and how businesses and consumers can prepare. The five threats outlined are: 1. Repositories and cloud storage […]

Ransomware, stolen data or malware: How do online crooks really make their money?

The cybercriminal economy has hit global revenues of $1.5 trillion a year, according a nine-month long study which shows the vast scale of cybercrime and  how profits are acquired, laundered, spent and reinvested. “The metaphor of “cybercrime as a business” is no longer adequate to capture its complexities.” says the Into the Web of Profit report, commissioned […]

How to Protect Industrial Control Systems from State-Sponsored Hackers

On March 15, a significant alert was issued by the US-CERT regarding Russian state-sponsored threat activity against critical infrastructure sectors, including energy, aviation, and critical manufacturing. The attacks were not random; these were deliberate, multistage, focused attacks designed to gain a foothold within high-impact assets that can be used for any number of nefarious actions. According to […]

Most US consumers don’t trust companies to keep their data private

While a majority of the US public sees companies’ ability to keep data private as absolutely key, it has little trust in companies to do so. In fact, only 20 percent of them “completely trust” organizations they interact with to maintain the privacy of their data, the results of a recent survey have shown. They […]

Cryptominers displace ransomware as the number one threat

During the first three months of 2018, cryptominers surged to the top of detected malware incidents, displacing ransomware as the number one threat, Comodo’s Global Malware Report Q1 2018 has found. Another surprising finding: Altcoin Monero became the leading target for cryptominers’ malware, replacing Bitcoin. For years, Comodo Cybersecurity has tracked the rise of cryptominer […]

Security researchers sinkholed EITest infection chain

Security researchers have managed to neutralize “EITest,” one of the oldest infection chains and thus preventing as many as two million potential malicious redirects a day. EITest relied on compromised websites – mostly WordPress-based, but also using other CMSes – to direct users to exploit kit landing pages and social engineering schemes, which then delivered a […]

Study Finds 87 Percent of Focused Cyberattacks are Prevented

With ransomware and distributed denial of service (DDoS) attacks on the rise, the average number of focused cyberattacks per organization has more than doubled this year compared to the previous 12 months. In the face of these growing cyber threats, organizations are demonstrating far more success in detecting and blocking them, according to a new […]

Russian hackers are attacking home routers, ISPs and business firewalls to spy and steal data, warns US, UK

Government-backed Russian hackers are using compromised routers and other network infrastructure to conduct espionage and potentially lay the groundwork for future offensive cyber operations, UK and US authorities have warned. In a joint statement, the US Department of Homeland Security (DHS), Federal Bureau of Investigation (FBI) and the UK’s National Cyber Security Centre (NCSC) – […]