TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 18, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 22 Jun 2018 13:51:39 +0000

As I pull together the list of zero-day filters for this blog, I see all types of vulnerabilities from various vendors. My interest is always piqued when I see a vulnerability affecting a security company. The Zero Day Initiative’s (ZDI) interest was also piqued when the researcher Pagefault submitted a Bitdefender vulnerability to the ZDI…

The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 18, 2018 appeared first on .

Read more

This Week in Security News: Macs, Hacks and Attacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 22 Jun 2018 13:30:33 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, GitHub was hacked via their official account with cryptocurrency Sycoin. Also, a phishing attack targeting trustee company HealthEquity led to the release of 23,000 Subscribers’ PHI. Read…

The post This Week in Security News: Macs, Hacks and Attacks appeared first on .

Read more

Trend Micro a Leader in Forrester Wave Endpoint Security Report

Credit to Author: Trend Micro| Date: Thu, 21 Jun 2018 18:20:45 +0000

The results are in from another independent analyst report and it’s great news for Trend Micro’s endpoint security. We achieved the highest score possible for the “strategy” category, were top ranked for “current offering” category, and among the second-highest scores in the market presence category, according to The Forrester Wave™: Endpoint Security Suites, Q2 2018[1]…

The post Trend Micro a Leader in Forrester Wave Endpoint Security Report appeared first on .

Read more

What’s causing the cybersecurity skills gap?

Credit to Author: Kayla Matthews| Date: Thu, 21 Jun 2018 15:00:00 +0000

More than 50 percent of companies report problematic shortages in the security skills of their staff. What’s causing the cybersecurity skills gap? And what are some potential solutions for closing it?

Categories:

Tags:

(Read more…)

The post What’s causing the cybersecurity skills gap? appeared first on Malwarebytes Labs.

Read more

Fake Fortnite for Android links found on YouTube

Credit to Author: Nathan Collier| Date: Wed, 20 Jun 2018 19:00:41 +0000

The extremely popular video game Fortnite is coming to Android sometime this summer, and the fanbase is going wild. Not surprisingly, mobile malware developers are taking advantage. Already, there are several videos on YouTube with links claiming to be versions of Fortnite for Android. Spoiler alert: they’re fake.

Categories:

Tags:

(Read more…)

The post Fake Fortnite for Android links found on YouTube appeared first on Malwarebytes Labs.

Read more

PSA: Recruitment portals and job sites at risk

Credit to Author: Malwarebytes Labs| Date: Wed, 20 Jun 2018 16:00:00 +0000

We’ve warned job seekers to be wary of phishing attacks, and we’re now doing the same for recruitment professionals: Beware of your recruitment portals, as they may play host to a lot of bad apples who—trust us—you wouldn’t want to hire out anywhere.

Categories:

Tags:

(Read more…)

The post PSA: Recruitment portals and job sites at risk appeared first on Malwarebytes Labs.

Read more

Satan ransomware raises its head again!

Credit to Author: Shriram Munde| Date: Wed, 20 Jun 2018 11:08:35 +0000

Satan ransomware first occurred in early 2017. And it has resurfaced with a new variant in 2018. We have seen it using new, innovative techniques to spread such as EternalBlue exploit to distribute over compromised networks.   This variant of Satan propagates using the below techniques: Mimikatz EternalBlue – exploit…

Read more

Cryptojacking is when someone illegally uses your PC to make digital money + 8 facts

Credit to Author: Rajiv Singha| Date: Wed, 20 Jun 2018 10:51:48 +0000

What attracts more than a magnet? You might have guessed it right – it is money! And where there is easy money, there is a lot of hustle and bustle. Till now, ransomware was seen as the ultimate cash cow for attackers – kidnap critical data and ask a ransom…

Read more