The Analyst Prompt #10: AI Facial Recognition Used in Ukraine/Russia War Prone to Vulnerabilities

The Analyst Prompt #10: AI Facial Recognition Used in Ukraine/Russia War Prone to Vulnerabilities

  Malware Trends: Responding to Fileless Malware Requires Forward Leaning Vulnerability Management It appears 2022 is the year fileless malware becomes a more frequent threat. A fileless malware attack is a technique ...
ransom networking ransomware

Palo Alto Networks Sees Rise in Ransomware Payments

Palo Alto Networks this week disclosed that, in cases worked by its Unit 42 incident response team, the average ransomware payment rose to $925,162 during the first five months of 2022. That ...
Security Boulevard
ransomware RagnarLocker takedown

Emotet Proved Too Effective for Threat Actors to Abandon

Old malware—even strains that have been taken down by law enforcement—never die. Nor do they just fade away; instead, they disappear for a while, regroup and re-emerge. This is exactly what the ...
Security Boulevard

Remotely Controlling Touchscreens

Researchers have demonstrated controlling touchscreens at a distance, at least in a laboratory setting: The core idea is to take advantage of the electromagnetic signals to execute basic touch events such as ...
Tools to Identify Exfiltration of Large Cryptocurrency Holdings Will Reduce Risk of Large Cyberattacks and Fraud on DeFi Platforms

Tools to Identify Exfiltration of Large Cryptocurrency Holdings Will Reduce Risk of Large Cyberattacks and Fraud on DeFi Platforms

Synopsis The Exfiltration Phase of The Kill Chain of a Cryptocurrency-Based Attack Provides the Greatest Opportunity to Identify Cybercriminals Cryptocurrency gained through illicit means is less useable than other assets due to ...
Ransomware demands acts of kindness to get your files back

Ransomware demands acts of kindness to get your files back

The great thing about working in the world of cybersecurity is that there’s always something new. You may think you’ve seen it all, and then something comes along that completely surprises you ...
zero-trust Implementing Zero-Trust Model

Why Zero-Trust Must Extend to Deep Infrastructure

It is a dramatic understatement to say that staying one step ahead of continually evolving cyberthreats like ransomware, malware and other severe attacks must be a top priority. Today’s global community of threat ...
Security Boulevard
TechSpective Podcast 089 - Rajiv Kulkarni

Rajiv Kulkarni Talks about the Malware Analysis Pipeline

TechSpective Podcast Episode 089 There is no such thing as perfect or invulnerable cybersecurity. The goal of cybersecurity is to raise the bar or cost of entry to make it as challenging ...

Rajiv Kulkarni Talks about the Malware Analysis Pipeline

TechSpective Podcast Episode 089 There is no such thing as perfect or invulnerable cybersecurity. The goal of cybersecurity is to raise the bar or cost of entry to make it as challenging ...
Ransomware detection

What is Ransomware Detection?

Ransomware detection notifies you when your files have been attacked and guides you through the process of restoring your files. Ransomware is a type of malicious software (malware) designed to block access ...