Oil and Gas Cybersecurity: Industry Overview Part 1

Oil and Gas Cybersecurity: Industry Overview Part 1

The oil and gas industry is no stranger to major cybersecurity attacks, attempting to disrupt operations and services. Most of the best understood attacks against the oil industry are initial attempts to break into the corporate networks of oil companies. Geopolitical tensions can cause major changes not only in physical space, but also in cyberspace. In March 2022, our researchers observed several alleged cyberattacks perpetrated by different groups. It has now become important more than…

Read More

Top malware strains observed in 2021

Top malware strains observed in 2021

Top malware strains observed in 2021 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike

Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike

Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike Cyber Threats Gootkit has been known to use fileless techniques to drop Cobalt Strike and other malicious payloads. Insights from a recent attack reveal updates in its tactics. By: Buddy Tancio, Jed Valderama July 27, 2022 Read time:  ( words) Our in-depth analysis of what began as an unusual PowerShell script revealed intrusion sets associated with Gootkit loader. In the past, Gootkit used freeware installers…

Read More

Cybercriminals are using messaging apps to deliver malware

Cybercriminals are using messaging apps to deliver malware

Cybercriminals are using messaging apps to deliver malware | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Cybercriminal dark web enterprises grow

Cybercriminal dark web enterprises grow

Cybercriminal dark web enterprises grow | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Better Together: AWS and Trend Micro

Better Together: AWS and Trend Micro

There’s a very good reason why AWS remains a leader in cloud computing. While many providers describe themselves as “customer obsessed,” few come close to our long-time partner in the lengths it goes to earn and retain the trust of its customers. AWS starts with the customer and works backwards. That means the vast majority of its feature enhancements and new services are directly driven from their input. The latest is Amazon GuardDuty Malware Protection….

Read More

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography Cloud In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking. By: Alfredo Oliveira, David Fiser July 21, 2022 Read time:  ( words) Previously, we reported on how threat actors are targeting multiple cloud environments such as Huawei Cloud to host cryptocurrency-mining malware by abusing misconfiguration issues and weak or stolen…

Read More

Ransomware in Q1 2022 doubled total 2021 volume

Ransomware in Q1 2022 doubled total 2021 volume

<!– Ransomware in Q1 2022 doubled total 2021 volume | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

87% of executives have no cybersecurity tools on personal devices

87% of executives have no cybersecurity tools on personal devices

<!– 87% of executives have no cybersecurity tools on personal devices | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 11 12 13 14 15 24