Detecting and preventing account takeover (ATO) attacks

Detecting and preventing account takeover (ATO) attacks

Account takeover (ATO) occurs when cybercriminals exploit stolen login credentials to gain unauthorized access to online accounts. ATOs can target people within organizations to steal sensitive information or customer accounts to enable fraudulent transactions. Given that ATO attacks have increased by 354% since 2023, having a strong prevention strategy is more crucial than ever to reduce risks for both customers and businesses. What is an account takeover (ATO) attack? ATO attacks can affect any organization…

Read More

Criminals Use Malware to Steal Near Field Communication Data

Criminals Use Malware to Steal Near Field Communication Data

Recent research by cybersecurity company ESET provides details about a new attack campaign targeting Android smartphone users. The cyberattack, based on both a complex social engineering scheme and the use of a new Android malware, is capable of stealing users’ near field communication data to withdraw cash from NFC-enabled ATMs. Constant technical improvements from the threat actor As noted by ESET, the threat actor initially exploited progressive web app technology, which enables the installation of…

Read More

Threat Actors Increasingly Target macOS

Threat Actors Increasingly Target macOS

Intel471’s new report reveals macOS is increasingly targeted by threat actors, who develop specific malware for the operating system or use cross-platform languages to achieve their goals on macOS computers. More macOS vulnerabilities are also being exploited in the wild. Malware and exploits might be used for both cybercrime and cyberespionage. More malware than ever on macOS Between January 2023 and July 2024, the researchers observed more than 40 threat actors targeting macOS systems with…

Read More

StormBamboo Compromises ISP to Spread Malware via Updates

StormBamboo Compromises ISP to Spread Malware via Updates

New research from cybersecurity company Volexity revealed details about a highly sophisticated attack deployed by a Chinese-speaking cyberespionage threat actor named StormBamboo. StormBamboo compromised an ISP to modify some DNS answers to queries from systems requesting legitimate software updates. Multiple software vendors were targeted. The altered responses led to malicious payloads served by StormBamboo in addition to the legitimate update files. The payloads targeted both macOS and Microsoft Windows operating systems. Who is StormBamboo? StormBamboo…

Read More

Does Antivirus Software Slow You Down? | McAfee Blog

Does Antivirus Software Slow You Down? | McAfee Blog

“Antivirus software slows down my PC.” This is a comment that is often heard when talking about antivirus and malware protection. That might be the case with many security products, but it’s not the case with McAfee. Independent tests since 2016 have proven that McAfee is not only good at catching malware and viruses, but also one of the lightest security products available today. What is antivirus protection? Antivirus forms a major cornerstone of online protection…

Read More

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Cyberattacks targeting the Paris Olympics have made headlines lately. Travel safety is important, but so is keeping up with online hygiene for those employees who may be working from home or in the office. The Olympics happen over multiple weeks and during work hours, unlike many other major sporting events, so there are more opportunities for threat actors to exploit the excitement. We’ve gathered some tips for IT teams during the Summer Olympics, with ideas…

Read More

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos analyzed the top 14 ransomware groups between 2023 and 2024 to expose their attack chain and highlight interesting Tactics,Techniques and Protocols. The security company also exposed the most leveraged vulnerabilities being triggered by ransomware actors. Ransomware attack chain: What Cisco Talos researchers learned Ransomware actors nearly all use the same attack chain. Typical ransomware attack chain. Image: Cisco Talos Step one for ransomware actors The first step for the threat actor consists of…

Read More

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Industrial cyber security in APAC is still lagging behind enterprises, but having some basic hygiene and a plan in place is “light years” better than nothing, according to director of incident response at operational technology cyber security firm Dragos Lesley Carhart. Carhart recommends industrial technology operators large or small in APAC realise they could all be targets, including from state actors looking to steal information or position themselves for a future geopolitical event, and to…

Read More

Operation Endgame: The ultimate troll patrol.

AI: The new partner in cybercrime?

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is…

Read More
1 2 3 4 24