Security

MalwareBytesSecurity

Advanced tools: Process Hacker

Credit to Author: Pieter Arntz| Date: Fri, 09 Nov 2018 16:16:46 +0000

A quick introduction to Process Hacker which is a powerful tool that can be used for troubleshooting, debugging, and reverse engineering.

Categories:

Tags:

(Read more…)

The post Advanced tools: Process Hacker appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

This Week in Security News: Fake Apps & Malicious Bots

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 09 Nov 2018 15:48:47 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how the adoption of mobile banking services has grown as an opportunity for scammers with fake banking apps. Also, see how Trickbot steals access from several…

The post This Week in Security News: Fake Apps & Malicious Bots appeared first on .

Read More
MicrosoftSecurity

Attack uses malicious InPage document and outdated VLC media player to give attackers backdoor access to targets

Credit to Author: Windows Defender ATP| Date: Thu, 08 Nov 2018 18:08:13 +0000

Our analysis of a targeted attack that used a language-specific word processor shows why its important to understand and protect against small-scale and localized attacks as well as broad-scale malware campaigns. The attack exploited a vulnerability in InPage, a word processor software for specific languages like Urdu, Persian, Pashto, and Arabic. More than 75% of

Read more

The post Attack uses malicious InPage document and outdated VLC media player to give attackers backdoor access to targets appeared first on Microsoft Secure.

Read More
MalwareBytesSecurity

How to create a sticky cybersecurity training program

Credit to Author: Jovi Umawing| Date: Thu, 08 Nov 2018 17:00:00 +0000

Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.

Categories:

Tags:

(Read more…)

The post How to create a sticky cybersecurity training program appeared first on Malwarebytes Labs.

Read More