5 Ways Modern Malware Defeats Cyber Defenses & What You Can Do About It

5 Ways Modern Malware Defeats Cyber Defenses & What You Can Do About It

Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. Yet ...

Magecart hits hundreds of websites via ad supply chain hijack

A criminal Magecart gang successfully compromised hundreds of ecommerce websites via a malicious script that silently harvested personal data and payment card information as customers bought goods and services online. The post ...
Cybersecurity Professionals Weigh In On What to Expect in 2019

Cybersecurity Professionals Weigh In On What to Expect in 2019

2019 is underway. Two weeks down, fifty to go. Technology continues to evolve rapidly and the threat landscape is constantly shifting. It’s challenging for organizations to try and stay a step ahead ...
Windows VCF Zero-Day Exploit Allows Remote Code Execution

Windows VCF Zero-Day Exploit Allows Remote Code Execution

A new unpatched vulnerability in Windows has been disclosed along with proof-of-concept exploit code. It could allow hackers to more easily install malware on computers, but it requires user interaction. The vulnerability ...
Security Boulevard
Ransomware Strains: The Stealthy Cyberthreat

Ryuk Ransomware That Hit U.S. Newspapers Not State-Sponsored

According to reports from several cybersecurity firms, the Ryuk ransomware that reportedly recently disrupted operations at several U.S.-based newspapers is run by cybercriminals, not state-sponsored actors. Some online sources have attributed the ...
Security Boulevard
Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

…and vice versa. That should be part of the title too, but it was already quite lengthy. On this episode of The Inner Circle, I am joined by Kevin Livelli, Director of ...
Threat Alert: MalSpam

Threat Alert: MalSpam

Radware researchers have been following multiple campaigns targeting the financial industry in Europe and the United States. These campaigns are designed to commit fraud via credential theft by sending MalSpam, malicious spam ...
Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Book Summary)

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Book Summary)

Step-by-step personal cybersecurity guidance from the book "Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals" by Bart R. McDonough ...
Reduce Cybersecurity Risk

85 Android Adware Apps Downloaded 9 Million Times

Researchers have found another batch of malicious Android applications on Google Play that spam users with annoying full-screen ads and make using their phones difficult. Trend Micro calls the adware AndroidOS_HidenAd and ...
Security Boulevard
Rogue iOS Apps Sent Data to Malicious Server

Rogue iOS Apps Sent Data to Malicious Server

Researchers have come across several games in the iOS app store that sent information to and communicated with a known malicious server. Finding malware in the iOS app store is rare because ...
Security Boulevard
Loading...