Cybersecurity pros think the enemy is winning

Credit to Author: Joan Goodchild| Date: Tue, 11 Jun 2019 15:00:00 +0000

Recent research from Malwarebytes, ISSA, and ESG find that security professionals have little confidence in their ability to prevent their organization from being breached. What’s behind this mindset? And how can we turn the tide to stay a step ahead of the criminals?

Categories:

Tags:

(Read more…)

The post Cybersecurity pros think the enemy is winning appeared first on Malwarebytes Labs.

Read more

Informing Your Security Posture: How Cybercriminals Blend into the Background

Credit to Author: Trend Micro| Date: Tue, 29 Jan 2019 14:00:23 +0000

Maintaining protection over an enterprise’s critical data, systems and assets is a continual uphill battle. Not only are chances good that the business’s digital footprint is growing through new applications, but hackers are also constantly bolstering their capabilities to silently breach platforms and maintain a presence under the radar of the IT team. In the…

The post Informing Your Security Posture: How Cybercriminals Blend into the Background appeared first on .

Read more

This Week in Security News: Fake Apps & Malicious Bots

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 09 Nov 2018 15:48:47 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how the adoption of mobile banking services has grown as an opportunity for scammers with fake banking apps. Also, see how Trickbot steals access from several…

The post This Week in Security News: Fake Apps & Malicious Bots appeared first on .

Read more

This Week in Security News: Tracking and Hacking

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 07 Sep 2018 11:30:46 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, Google revealed a secret deal with Mastercard that allows it to track what users buy offline. Also, Senate and House representatives warn that regulation may be coming for…

The post This Week in Security News: Tracking and Hacking appeared first on .

Read more

BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

Credit to Author: Trend Micro| Date: Fri, 31 Aug 2018 15:34:48 +0000

For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack…

The post BEC is Big Business for Hackers: What makes these attacks so hard to prevent? appeared first on .

Read more

Cybercriminals Changing Tactics as Seen in First Half Report

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 28 Aug 2018 12:05:30 +0000

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…

The post Cybercriminals Changing Tactics as Seen in First Half Report appeared first on .

Read more

How Digital Extortion Impacts Today’s Enterprises

Credit to Author: Trend Micro| Date: Wed, 22 Aug 2018 14:47:42 +0000

By now, many enterprise decision-makers are familiar with the concept of digital extortion, particularly in the form of ransomware. These encryption-based attacks lock users out of their sensitive and valuable data, applications and operating systems. Attackers demand a ransom in the form of untraceable digital currency for the decryption key – which may or may…

The post How Digital Extortion Impacts Today’s Enterprises appeared first on .

Read more

Under the hoodie: why money, power, and ego drive hackers to cybercrime

Credit to Author: Wendy Zamora| Date: Wed, 15 Aug 2018 14:00:00 +0000

We know what cybercriminals do. We know how they do it. Now we ask: why? This in-depth profile examines what makes hackers turn to cybercrime, and what could change their minds.

Categories:

Tags:

(Read more…)

The post Under the hoodie: why money, power, and ego drive hackers to cybercrime appeared first on Malwarebytes Labs.

Read more

A Look at Scan4You and the Counter Antivirus Service Landscape

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 02 Aug 2018 17:30:09 +0000

The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker activity. If and when these signatures or processes are detected, the antivirus program…

The post A Look at Scan4You and the Counter Antivirus Service Landscape appeared first on .

Read more

This Week in Security News: HR and Heritage Hacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 08 Jun 2018 13:47:12 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the details of 92 million accounts for MyHertitage were discovered on a private server outside of the company. Also, companies using services from PageUp are notifying employees that…

The post This Week in Security News: HR and Heritage Hacks appeared first on .

Read more

The New Mobile Threat Landscape, circa 2017 to 2018

Credit to Author: Trend Micro| Date: Thu, 26 Apr 2018 13:00:10 +0000

Is your phone infected?

Submitted by Ian Grutze If mobile threats diversified and expanded in 2016, they matured in 2017. Mobile ransomware continued to rear its head, burgeoning into the platform’s most prevalent threat. Simple screen lockers, for instance, evolved into file-encrypting malware, some of which even seemed to keep pace with their desktop counterparts in terms of malicious routines….

The post The New Mobile Threat Landscape, circa 2017 to 2018 appeared first on .

Read more