Tag "Cyber Attacker"

Back to homepage
Industry Insights

What is Watering hole attack and how to stay protected from such attacks?

The attacker first stalks the websites often visited by a victim or a particular group, and then infect the frequently visited websites with malware. The attacker then identifies the vulnerabilities

Identity Theft

The inside track on protecting intellectual property (IP)

Dr Darren Williams, CEO and Founder of BlackFog, discusses the need for firms to protect their IP from cyber attack and provides advice on how to stop hackers from removing

Hardware/Network

Attackers repackage popular Android VPN app with Triout malware

Triout malware was first detected in August 2018 which infected Android applications and had spyware capabilities such as recording phone calls and text messages, and more. Recently, the malware was

Software

Cybercriminals leverage Google Translate to hide their phishing sites

Attackers are using a new technique that uses Google Translate to hide the real domain of their phishing sites. This phishing technique works more effectively in mobile devices when compared

Industry Insights

How deception changes the rules of engagement in cyber security

Carolyn Crandall, Chief Deception Officer at Attivo Networks, explores how deception techniques can provide not only early detection of malicious activity but also an invaluable insight into an attacker’s methods.Deception

Software

Zero-day vulnerability in ‘Total Donations’ plugin could allow attackers to take over WordPress sites

The zero-day affects all versions of Total Donations plugin, a commercial plugin that is used to gather and manage donations. The plugin’s code contains several design flaws that inherently expose

Identity Theft

Deception for proactive defense

This article is fourth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of

Industry Insights

Airbus CyberSecurity 2019 Predictions: The World Will See Its First Cybersecurity Treaty.

Extortion Attacks On OT And IIoT Infrastructure. Prediction: Critical Infrastructure Will Be Disrupted By A Major Extortion Attack. We’ve already seen extortion-driven attacks on infrastructure such as cities and ports,

Software

Success is in the Scoping: Incorporating Penetration Testing into Your Cybersecurity Planning

If you’re considering incorporating penetration testing into your cybersecurity planning process, there are some key considerations to keep in mind when you’re figuring out exactly what’s ‘in scope’ — what

Hardware/Network

Critical flaw in Schneider Electric’s vehicle charging station could have allowed hackers to compromise system

A vulnerability in Schneider Electric’s EVLink Parking devices – a line of electric car charging stations – could have enabled hackers to gain access to the system. Schneider Electric said