Month: December 2020
-
TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions
The TrickBot malware has morphed once again, this time implementing functionality designed to inspect the UEFI/BIOS firmware of targeted …
-
Cloud Security Threats for 2021
Security in the cloud era is a priority — but the cloud has provided bad actors with a greater set of targets than ever, as well as with …
-
Google Uncovers iPhone Exploit That Can Steal Data Over Wi-Fi
The attack utilizes a Raspberry Pi and off-the-shelf Wi-Fi adapters. It took some time to find the right combination of …
-
Bank Employee Sells Personal Data of 200k Clients
South Africa–based financial services group Absa has stated that one of its employees sold the personal information of 200,000 clients to …
-
Dell announces new protections for its PC and server supply chain
PC maker powerhouse Dell announced today a flurry of new enterprise security solutions for the company’s line of enterprise products. The …
-
Security of Millions At Risk Due to Unpatched Android Apps
Check Point explained that in server-side vulnerabilities, the patching process is simpler as the patch has to be applied to the server …
-
Crooks posing as COVID-19 ‘cold chain’ company phished EU for vaccine intel, says IBM
An unidentified group of malicious sorts impersonated a so-called “cold chain” company involved in COVID-19 vaccine distribution networks …
-
Cybersecurity Considerations in the Work-From-Home Era
Verisign is deeply committed to protecting our critical internet infrastructure from potential cybersecurity threats, and to keeping up to …
-
Mitigating DDoS attacks with network function virtualization
Distributed denial of service (DDoS) attacks are more than an inconvenience; they paralyze operations and cause significant direct and …
-
Best practices for protecting your data from ransomware
Ransomware attacks are up 148% amid COVID-19, as cybercriminals take advantage of the new work-from-home world and target vulnerable …
-
Cyber-Criminals Target #COVID19 Vaccine
Cybersecurity analysts at IBM are urging cold-chain companies to be “on high alert” after discovering a spear-phishing scheme that targets …
-
Reaching Strategic Outcomes With An MDR Provider: Part 3
In this multipart blog series, we’re exploring how effective managed detection and response (MDR) services help organizations achieve …
●●●