Tag "Cyber Attacker"
What is Watering hole attack and how to stay protected from such attacks?
The attacker first stalks the websites often visited by a victim or a particular group, and then infect the frequently visited websites with malware. The attacker then identifies the vulnerabilities
The inside track on protecting intellectual property (IP)
Dr Darren Williams, CEO and Founder of BlackFog, discusses the need for firms to protect their IP from cyber attack and provides advice on how to stop hackers from removing
Attackers repackage popular Android VPN app with Triout malware
Triout malware was first detected in August 2018 which infected Android applications and had spyware capabilities such as recording phone calls and text messages, and more. Recently, the malware was
Cybercriminals leverage Google Translate to hide their phishing sites
Attackers are using a new technique that uses Google Translate to hide the real domain of their phishing sites. This phishing technique works more effectively in mobile devices when compared
How deception changes the rules of engagement in cyber security
Carolyn Crandall, Chief Deception Officer at Attivo Networks, explores how deception techniques can provide not only early detection of malicious activity but also an invaluable insight into an attacker’s methods.Deception
Zero-day vulnerability in ‘Total Donations’ plugin could allow attackers to take over WordPress sites
The zero-day affects all versions of Total Donations plugin, a commercial plugin that is used to gather and manage donations. The plugin’s code contains several design flaws that inherently expose
Deception for proactive defense
This article is fourth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of
Airbus CyberSecurity 2019 Predictions: The World Will See Its First Cybersecurity Treaty.
Extortion Attacks On OT And IIoT Infrastructure. Prediction: Critical Infrastructure Will Be Disrupted By A Major Extortion Attack. We’ve already seen extortion-driven attacks on infrastructure such as cities and ports,
Success is in the Scoping: Incorporating Penetration Testing into Your Cybersecurity Planning
If you’re considering incorporating penetration testing into your cybersecurity planning process, there are some key considerations to keep in mind when you’re figuring out exactly what’s ‘in scope’ — what
Critical flaw in Schneider Electric’s vehicle charging station could have allowed hackers to compromise system
A vulnerability in Schneider Electric’s EVLink Parking devices – a line of electric car charging stations – could have enabled hackers to gain access to the system. Schneider Electric said