A week in security (October 28 – November 3)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 Nov 2019 16:37:57 +0000

A roundup of the latest cybersecurity news for the week of October 28 – November 3, including cyberattacks against SMBs, the Internet’s 50th birthday, stalkerware, donation scams, and more.

Categories:

Tags:

(Read more…)

The post A week in security (October 28 – November 3) appeared first on Malwarebytes Labs.

Read more

The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT

Credit to Author: Threat Intelligence Team| Date: Tue, 22 Oct 2019 15:00:00 +0000

Bread crumbs left behind open up a possible connection between Magecart Group 5 and Carbanak.

Categories:

Tags:

(Read more…)

The post The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT appeared first on Malwarebytes Labs.

Read more

Securing the managed service provider (MSP)

Credit to Author: William Tsing| Date: Fri, 11 Oct 2019 18:04:49 +0000

Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.

Categories:

Tags:

(Read more…)

The post Securing the managed service provider (MSP) appeared first on Malwarebytes Labs.

Read more

The Advanced Persistent Threat Files: APT1

Credit to Author: William Tsing| Date: Fri, 22 Feb 2019 17:59:13 +0000

Next up in the Advanced Persistent Threat Files: APT1, a unit of the People’s Liberation Army of China known for wide-scale and high-volume data collection on mostly English-speaking companies.

Categories:

Tags:

(Read more…)

The post The Advanced Persistent Threat Files: APT1 appeared first on Malwarebytes Labs.

Read more

The Cloud in 2019: Current Uses and Emerging Risks

Credit to Author: Trend Micro| Date: Wed, 13 Feb 2019 15:48:32 +0000

In the current tech landscape, one would be hard-pressed to find an organization that operates without the help of cloud environments and capabilities. From data storage and document sharing to enabling remote access and communication, the cloud represents the most critical linchpin of today’s IT-focused business processes. What’s more, the power of the cloud is…

The post The Cloud in 2019: Current Uses and Emerging Risks appeared first on .

Read more

Informing Your Security Posture: How Cybercriminals Blend into the Background

Credit to Author: Trend Micro| Date: Tue, 29 Jan 2019 14:00:23 +0000

Maintaining protection over an enterprise’s critical data, systems and assets is a continual uphill battle. Not only are chances good that the business’s digital footprint is growing through new applications, but hackers are also constantly bolstering their capabilities to silently breach platforms and maintain a presence under the radar of the IT team. In the…

The post Informing Your Security Posture: How Cybercriminals Blend into the Background appeared first on .

Read more

The Advanced Persistent Threat files: APT10

Credit to Author: William Tsing| Date: Wed, 16 Jan 2019 17:00:00 +0000

While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we’re going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.

Categories:

Tags:

(Read more…)

The post The Advanced Persistent Threat files: APT10 appeared first on Malwarebytes Labs.

Read more

Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack

Credit to Author: msft-mmpc| Date: Thu, 04 May 2017 16:29:18 +0000

Several weeks ago, the Windows Defender Advanced Threat Protection (Windows Defender ATP) research team noticed security alerts that demonstrated an intriguing attack pattern. These early alerts uncovered a well-planned, finely orchestrated cyberattack that targeted several high-profile technology and financial organizations. An unknown attacker was taking advantage of a silent yet effective attack vector: the compromised…

Read more