Malware
Invisible rat: how Sentry, Datadog, and others used by XSS and JavaScript malware
We all know how it’s convenient to use tools like Sentry or Datadogs for JavaScript events monitoring. It allows to catch errors in real-time, organize and manage issues resolution process, and genuinely ...
Finland Fending Off FluBot Malware, Again
The Finnish National Cyber Security Centre (NCSC-FI) has issued a warning to citizens about the current version of the FluBot malware campaign which is affecting “tens of thousands of people in Finland.” ...
Sophisticated Tardigrade malware launches attacks on vaccine manufacturing infrastructure
Security researchers are warning biomanufacturing facilities around the world that they are being targeted by a sophisticated new strain of malware, known as Tardigrade. The warning comes from the non-profit Bioeconomy Information ...
The Evolving Threat of Ransomware
Currently, ransomware is the most prominent cyber threat to businesses and individuals. Ransomware attacks are growing more prevalent as cybercriminals find new ways to profit from them. According to CyberEdge’s 2021 Cyberthreat ...
Cybereason Research Finds Organizations Unprepared for Ransomware Attacks on Weekends and Holidays
In June of 2021, Cybereason published a global research report, titled Ransomware: The True Cost to Business, which revealed that the vast majority of organizations that have suffered a ransomware attack experienced ...
Examples of Large & Small Business Cyber Attacks: Fighting for Survival Against a New Wave of Cyber Criminals
There are two types of businesses in the world today. Those that have been attacked by cybercriminals, and those that haven’t, yet. In what is becoming increasingly clear, most of these businesses ...
Benefits of a Website Malware Scanner
Malicious code/ software can wreak havoc for the business, from account takeover and database tampering to stealing data and causing other forms of cyberattacks. A website malware scanner enables organizations to proactively address the challenge. The post ...
The Coming Mac Threat (Revisited)
How we viewed security for the Mac in 2008. This is a republished article from MacUser magazine. In The Coming Mac Threat (Revisited) we look at how experts perceived security for the ...
THREAT ALERT: Malicious Code Implant in the UAParser.js Library
The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them ...
CISO Stories Podcast: NotPetya – 45 Minutes and 10,000 Servers Encrypted
Learn how to prepare and reduce the risk of the next ransomware event as Todd Inskeep, Founder at Incovate Solutions, walks us through the lessons learned after managing out of a NotPetya ...