How to distribute SOC tasks | Kaspersky official blog

Credit to Author: Sergey Soldatov| Date: Fri, 02 Sep 2022 17:22:13 +0000
How to distribute SOC tasks to tackle both the cybersecurity skills shortage and burnout.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Sergey Soldatov| Date: Fri, 02 Sep 2022 17:22:13 +0000
How to distribute SOC tasks to tackle both the cybersecurity skills shortage and burnout.
Read MoreCredit to Author: Vickie Su| Date: Fri, 02 Sep 2022 00:00:00 +0000
In March 2021, we investigated a backdoor with a unique modular architecture and called it BumbleBee due to a string embedded in the malware. However, in our recent investigations, we have discovered a controller application that expands its capabilities.
Read More
Credit to Author: Ahmed Abdelghani| Date: Fri, 02 Sep 2022 12:12:21 +0000
From an ex-Twitter exec blowing the whistle to Janet Jackson’s song crashing hard drives – it’s episode 265 of the Transatlantic Cable podcast.
Read More
Credit to Author: Jonny Evans| Date: Fri, 02 Sep 2022 04:55:00 -0700
When Craig Federighi, Apple’s senior vice president of software engineering last year said, “We have a level of malware on the Mac that we don’t find acceptable,” he apparently really meant it. And Apple seems to be doing about something about it.
Federighi characterized Apple as being in an enduring battle against malware on the Mac. He also explained that between May 2020 and May 2021 the company identified 130 types of Mac malware that infected 300,000 systems.
Given the Mac’s reputation for security, that may seem counter intuitive, but maintaining a secure platform requires constant watchfulness.

Credit to Author: Lucas Mearian| Date: Thu, 01 Sep 2022 16:46:00 -0700
Apple this week released urgent security updates to address zero-day vulnerabilities on older model iPhones, iPads, and iPods.
The patches, pushed out on Wednesday, address an out-of-bounds write issue that could be exploited by an attacker enabling them to take control of the affected device. The US Cybersecurity and Infrastructure Agency (CISA) today encouraged users and IT admins to review Apple’s advisory HT213428 and apply the necessary updates.
Categories: News Tags: Apple Tags: iOS 12.5.6 Tags: webkit Tags: CVE-2022-32893 Apple has released a security update for iOS 12.5.6 to patch a remotely exploitable WebKit vulnerability that allows attackers to execute arbitrary code on unpatched devices. |
The post Apple releases security update for iPhones and iPads to address vulnerability appeared first on Malwarebytes Labs.
Read MoreCategories: News Tags: Exploit Tags: vulnerability Tags: Tik-Tok Tags: Microsoft Tags: JavaScript We take a look at a TikTok exploit discovered by Microsoft and passed on to the social media giant to have fixed. |
The post TikTok vulnerability could have allowed hijackers to take over accounts appeared first on Malwarebytes Labs.
Read MoreCategories: News People are often confused as to where the security industry draws the line between something that is considered a keylogger and something that is not. Read on to learn what this term means, from a practical perspective. |
The post What is a keylogger? appeared first on Malwarebytes Labs.
Read More