Tag: Vectors
-
Attackers Increasingly Turning to DDoS as a Ransom Vector
Nearly half (44%) of organizations have been targeted or fallen victim to a ransom-related distributed denial of service (RDDoS) attack in …
-
Microsoft 365: Most Common Threat Vectors & Defensive Tips
As more organizations have grown reliant on Microsoft 365, Google Cloud, and Amazon Web Services, cybercriminals have begun to realize that …
-
Researchers Explore Active Directory Attack Vectors
Active Directory is a massive and complex attack surface that has long been a prime target for criminals seeking valuable privileges and …
-
Home-Office Photos: A Ripe Cyberattack Vector
That photo that appears when someone disables his or her Zoom video, or those photos of a remote worker’s home office shared on Instagram …
-
Was JetBrains Tool an Infection Vector for SolarWinds Hack?
Reacting to news reports claiming hackers may have used Czech software firm JetBrains’ TeamCity tool as an initial infection vector during …
-
VMware Flaw a Vector in SolarWinds Breach?
U.S. government cybersecurity agencies warned this week that the attackers behind the widespread hacking spree stemming from the compromise …
-
A New Risk Vector: The Enterprise of Things
When FedEx subsidiary TNT Express was hit by ransomware in 2017, its delivery units were crippled and much of its shipping operations …
-
Top 5 Threat Vectors in Connected Cars and How to Combat Them
Plug-in electric and at least partially autonomous connected cars are a common sight on roads around the world. The software and electronic …
-
Top Ransomware Attack Vectors: RDP, Drive-By, Phishing
Cybercrime forum seller advertising access to a hacked Fortune 500 firm (Source: Trend Micro) Ransomware-wielding gangs are continuing to …
-
Designing Firmware Resilience for 3 Top Attack Vectors
Smart hackers always want to take the least cumbersome route. Historically, that meant targeting vulnerabilities in software, and in the …
-
Microsoft Office Bug Remains Top Malware Delivery Vector
The third quarter of 2019 brought the rise of keylogger Agent Tesla, the decline of phishing-delivered ransomware-as-a-service (RaaS), and …
-
More Destructive Botnets and Attack Vectors Are on Their Way
If the growth of the attack landscape continues at this rate, we as security practitioners need to begin asking serious questions. …
●●●