How the most damaging ransomware evades IT security

Credit to Author: Mark Loman| Date: Thu, 14 Nov 2019 13:50:28 +0000

This article is a condensed version of our report How Ransomware Behaves: What defenders should know about the top families<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/-0DnxPzSZek” height=”1″ width=”1″ alt=””/>

Read more

A taste of the onslaught at the network’s edge

Credit to Author: Andrew Brandt| Date: Tue, 30 Apr 2019 14:01:11 +0000

Edge devices take a licking so the rest of the network can keep on ticking, but they do need a little extra TLC<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/yLDeI_Y5qG8″ height=”1″ width=”1″ alt=””/>

Read more

Are hackers gonna hack anymore? Not if we keep reusing passwords

Credit to Author: Kacy Zurkus| Date: Thu, 21 Mar 2019 15:00:00 +0000

A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.

Categories:

Tags:

(Read more…)

The post Are hackers gonna hack anymore? Not if we keep reusing passwords appeared first on Malwarebytes Labs.

Read more

Simple Authentication and Security Layer (SASL) vulnerabilities

Credit to Author: Pieter Arntz| Date: Fri, 21 Sep 2018 15:00:00 +0000

The Simple Authentication and Security Layer (SASL) is an essential element of online authentication. But are you aware of all the known vulnerabilities? And, more importantly, have you patched them?

Categories:

Tags:

(Read more…)

The post Simple Authentication and Security Layer (SASL) vulnerabilities appeared first on Malwarebytes Labs.

Read more