International Malware Takedown Seized 100+ Servers

International Malware Takedown Seized 100+ Servers

An international coalition of police organized by the European Union’s justice and police agencies has revealed an ongoing operation against malware droppers that Europol calls the “largest ever operation” of its kind. Called “Operation Endgame,” the ongoing initiative targets malware delivery “droppers” and “loaders,” and is an attempt to disrupt large-scale malware deployments. Between May 27 and May 29, police arrested four people, seized more than 100 servers and took control of more than 2,000…

Read More

International Malware Takedown Seized 100+ Servers

International Malware Takedown Seized 100+ Servers

An international coalition of police organized by the European Union’s justice and police agencies has revealed an ongoing operation against malware droppers that Europol calls the “largest ever operation” of its kind. Called “Operation Endgame,” the ongoing initiative targets malware delivery “droppers” and “loaders,” and is an attempt to disrupt large-scale malware deployments. Between May 27 and May 29, police arrested four people, seized more than 100 servers and took control of more than 2,000…

Read More

Emerging national security threats

Emerging national security threats

In this episode of The Security Podcasts featuring Felipe Fernandez, Chief Technology Officer at Fortinet Federal, we discuss the challenges and opportunities for enterprise security professionals in the scope of national security.  “I think that the landscape just really has grown quite a bit — because you know, digital transformation, right? I think that’s something that’s changed almost the acquisition of anything. IT, OT, all of that is prevalent in almost any capability that a government organization…

Read More

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Kaspersky’s new report provides the company’s view on the advanced persistent threats landscape for 2024. Existing APT techniques will keep being used, and new ones will likely emerge, such as the increase in AI usage, hacktivism and targeting of smart home tech. New botnets and rootkits will also likely appear, and hacker-for-hire services might increase, as will supply chain attacks, which might be provided as a service on cybercriminals’ underground forums. Jump to: More exploitation…

Read More

Assessing the pros and cons of AI for cybersecurity

Assessing the pros and cons of AI for cybersecurity

Assessing the pros and cons of AI for cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Musk’s Twitter takeover and its security implications

Musk’s Twitter takeover and its security implications

Musk’s Twitter takeover and its security implications | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

4 phishing trends observed in Q1 2022

4 phishing trends observed in Q1 2022

4 phishing trends observed in Q1 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

DDoS attacks and botnets in 2021 – Mozi, takedowns and high-frequency attacks reshape the threat landscape

DDoS attacks and botnets in 2021 – Mozi, takedowns and high-frequency attacks reshape the threat landscape

DDoS attacks and botnets in 2021 – Mozi, takedowns, and high-frequency attacks reshape the threat landscape | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Tackling the challenges of detecting P2P botnets

Tackling the challenges of detecting P2P botnets

Tackling the challenges of detecting P2P botnets | 2020-11-11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More