Last Chance for Forensics Teams with Emotet Erased on Sunday

Last Chance for Forensics Teams with Emotet Erased on Sunday

IT security teams have until Sunday to hunt for evidence of Emotet infection, and potentially related malware, before the notorious botnet is removed from all global devices on Sunday, experts have warned. Back in January, Europol announced that law enforcers had been able to seize the infrastructure used by Emotet in a coordinated international operation. On Sunday April 25, they will deliver an update (EmotetLoader.dll) file designed to erase the malware from all infected machines globally….

Read More

Creating a multicloud security architecture: IDG’s CIO Think Tank

Creating a multicloud security architecture: IDG’s CIO Think Tank

CIO | Apr 23, 2021 IDG convened 30 senior IT executives as part of our CIO Think Tank Program to explore key opportunities and challenges with multicloud – including security issues IT leaders face in building a true multicloud architecture. Join us as we shed light on problems voiced by these IT executives, explore how savvy IT shops are crafting a cross-cloud security architecture, and discuss how their strategic vendor partners can help ease the…

Read More

Lockdown Hotel Bookings at Risk Due to DMARC Fail

Lockdown Hotel Bookings at Risk Due to DMARC Fail

Some of the UK’s biggest hotel brands may be exposing themselves and their customers to the risk of phishing attacks due to a lack of adequate messaging security, according to Proofpoint. The security vendor took a look at the primary corporate domains associated with the 60 most popular listed hospitality companies in the country, as ranked by YouGov. It found that half (50%) have no published DMARC (Domain-based Message Authentication, Reporting & Conformance) record. The…

Read More

TLS-Encrypted Malware Volumes Double in Just Months

TLS-Encrypted Malware Volumes Double in Just Months

The volume of malware hidden in encrypted traffic has doubled over the past few months as threat actors look to circumvent security tools, according to Sophos. The security vendor claimed that 23% of the malware it detected in 2020 was encrypted with the Transport Layer Security (TLS) protocol. However, in the first three months of 2021, the figure had grown to reach nearly 46%. The rise can be linked to an overall increase in use…

Read More

The threat landscape for the water industry

The threat landscape for the water industry

The threat landscape for the water industry | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The role of transparency in establishing security assurance

The role of transparency in establishing security assurance

The role of transparency in establishing security assurance | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

The boom in collaboration software creates extra security risks

The boom in collaboration software creates extra security risks

While the software solutions have made it easier to work from home, they’ve also made it easier to launch malware. TechRepublic’s Karen Roby spoke with Otavio Freire, president, CTO and co-founder of SafeGuard Cyber, about security issues in collaboration software. The following is an edited transcript of their conversation. Karen Roby: We do all of our work now, or the good majority of it, through things like this, right? Zoom and Teams, and we’re talking…

Read More

China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors

China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors

At least one China-linked APT group exploited a new zero-day flaw in Pulse Secure VPN equipment to break into the networks of US defense contractors. According to coordinated reports published by FireEye and Pulse Secure, two hacking groups have exploited a new zero-day vulnerability in Pulse Secure VPN equipment to break into the networks of US defense contractors and government organizations worldwide. The statement reveals that one of the two hacking groups was a China-linked cyber espionage group….

Read More
1 2,301 2,302 2,303 2,304 2,305 2,568