Tag "Malware"

Back to homepage
Software

Vaporworms: New breed of self-propagating fileless malware to emerge in 2019

WatchGuard Technologies’ information security predictions for 2019 include the emergence of vaporworms, a new breed of fileless malware with wormlike properties to self-propagate through vulnerable systems, along with a takedown

Hardware/Network

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what’s wrong and best practices for fixing it.Industrial control systems (ICS) are designed to

Software

Easy Steps for Recovery from a Hacked Website

By Julia Sowells Senior Information Security Specialist at Hacker Combat, A website getting hacked is no news today; it has become an almost common thing. So, what to do if your

Software

USB threat vector trends and implications for industrial operators

In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to transfer patches, updates and files

Software

Understanding the art of phishing

The goal is to trick the recipient into believing the email is genuine, with the intention of getting the target to either download malware, or hand over personal information.Using cyber-attacks

Hardware/Network

Overcoming Common SD-WAN Security Mistakes

Digital transformation is about much more than moving workflows to the cloud and adopting IoT. It is about retooling the entire network to make it faster, more efficient, much more

Software

Burned malware returns, says Cylance report: Is Hacking Team responsible?

Burning malware is like Hercules fighting the nine-headed Hydra. For every head he cuts off, two more grow back in its place. That’s the lesson from a new report by

Software

Email Still Poses a Cyber-Threat, but There is Hope

The total number of emails sent and received daily worldwide exceeds 281 billion and is forecast to grow to over 333 billion by 2022. Cyber-criminals have taken advantage of this

Hardware/Network

Endpoint security solutions challenged by zero-day and fileless attacks

There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. The organizations polled 660 IT and security

Software

The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion

The Necurs botnet, a large and well-known spam originator, has become synonymous with cybercrime. Its spam-sending capabilities, through a botnet of a few million infected devices, are frequently dedicated to