Microsoft issues warning over malware threat; New York-based healthcare organization discloses data breach

Data breaches aren’t the only way cybercriminals compromise personal information. Malware is another tactic they commonly use as well. In fact, the AV-TEST Institute finds more than 450,000 new pieces of malware ...
What Is Cryptojacking? How It Works and How to Protect Against It

What Is Cryptojacking? How It Works and How to Protect Against It

Cryptojacking is the unauthorized use of another computer to “mine” cryptocurrency—using them to run complex and taxing algorithms. The post What Is Cryptojacking? How It Works and How to Protect Against It ...
Investigating NATO-Themed Phishing Lures With EclecticIQ Intelligence Center and Endpoint Response Tool

Investigating NATO-Themed Phishing Lures With EclecticIQ Intelligence Center and Endpoint Response Tool

Synopsis With cyberattacks such a common occurrence, analysts must be able to stay ahead of the curve by investigating files and indicators of compromise quickly and efficiently. The EclecticIQ Intelligence Center (IC) ...
U.S. Seeks to Incentivize Semiconductor Manufacturing Domestically

U.S. Seeks to Incentivize Semiconductor Manufacturing Domestically

Policy and Governance: U.S. Government Restricts AI Chips to China U.S. government officials have instructed the American technology company NVIDIA to stop exporting products containing the A100 and H100, two high-end processors ...

New Linux Cryptomining Malware

It’s pretty nasty: The malware was dubbed “Shikitega” for its extensive use of the popular Shikata Ga Nai polymorphic encoder, which allows the malware to “mutate” its code to avoid detection. Shikitega ...
Asigra Malware

Techstrong TV: How to Prepare for Highly Destructive Malware

With cyberattacks on the rise with Microsoft’s warning of a highly destructive form of malware in Ukraine and White Rabbit being linked to FIN8, Tim Van Ash, Sr. VP of Product and ...
Security Boulevard
The Analyst Prompt #15: Network Environment-Focused Conversations Needed in Approaches to Cyber Security

The Analyst Prompt #15: Network Environment-Focused Conversations Needed in Approaches to Cyber Security

Exploit Tools and Targets: Enhance Third-Party Risk Management to Mitigate Multi-Targeted Approach Third-party attacks, or supply chain attacks, occur when a trusted software, vendor, or other external company property or personnel is ...
Long Term Analysis Illustrates How Risk Posed by a Vulnerability Changes as Exploits Develop Over Time

Long Term Analysis Illustrates How Risk Posed by a Vulnerability Changes as Exploits Develop Over Time

Introduction Vulnerability management is a popular cybersecurity strategy prioritizing known weaknesses. Much cybersecurity analysis focuses on a particular threat at a specific point in time, covering a narrow window of activity as ...
provenance cybersecurity Akamai

The Power of Provenance: From Reactive to Proactive Cybersecurity

While next-gen firewalls (NGFW), extended detection and response (XDR) and other security solutions do a great job of detecting and thwarting cyberattacks, it’s just too common for a sneaky or camouflaged threat ...
Security Boulevard
malware Slack

Malware Families Love Telegram, Discord as Much as Users

Messaging apps like Discord and Telegram have become a conduit for malware, as their popularity grows among users who want to create and share programs on the platforms. These bots may facilitate ...
Security Boulevard