Pulse VPN patched their vulnerability, but businesses are trailing behind

Credit to Author: Pieter Arntz| Date: Fri, 18 Oct 2019 16:36:36 +0000

After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What’s up?

Categories:

Tags:

(Read more…)

The post Pulse VPN patched their vulnerability, but businesses are trailing behind appeared first on Malwarebytes Labs.

Read more

Cybersecurity pros think the enemy is winning

Credit to Author: Joan Goodchild| Date: Tue, 11 Jun 2019 15:00:00 +0000

Recent research from Malwarebytes, ISSA, and ESG find that security professionals have little confidence in their ability to prevent their organization from being breached. What’s behind this mindset? And how can we turn the tide to stay a step ahead of the criminals?

Categories:

Tags:

(Read more…)

The post Cybersecurity pros think the enemy is winning appeared first on Malwarebytes Labs.

Read more

Informing Your Security Posture: How Cybercriminals Blend into the Background

Credit to Author: Trend Micro| Date: Tue, 29 Jan 2019 14:00:23 +0000

Maintaining protection over an enterprise’s critical data, systems and assets is a continual uphill battle. Not only are chances good that the business’s digital footprint is growing through new applications, but hackers are also constantly bolstering their capabilities to silently breach platforms and maintain a presence under the radar of the IT team. In the…

The post Informing Your Security Posture: How Cybercriminals Blend into the Background appeared first on .

Read more

This Week in Security News: Fake Apps & Malicious Bots

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 09 Nov 2018 15:48:47 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how the adoption of mobile banking services has grown as an opportunity for scammers with fake banking apps. Also, see how Trickbot steals access from several…

The post This Week in Security News: Fake Apps & Malicious Bots appeared first on .

Read more

This Week in Security News: Tracking and Hacking

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 07 Sep 2018 11:30:46 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, Google revealed a secret deal with Mastercard that allows it to track what users buy offline. Also, Senate and House representatives warn that regulation may be coming for…

The post This Week in Security News: Tracking and Hacking appeared first on .

Read more

BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

Credit to Author: Trend Micro| Date: Fri, 31 Aug 2018 15:34:48 +0000

For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack…

The post BEC is Big Business for Hackers: What makes these attacks so hard to prevent? appeared first on .

Read more

Cybercriminals Changing Tactics as Seen in First Half Report

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 28 Aug 2018 12:05:30 +0000

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…

The post Cybercriminals Changing Tactics as Seen in First Half Report appeared first on .

Read more

How Digital Extortion Impacts Today’s Enterprises

Credit to Author: Trend Micro| Date: Wed, 22 Aug 2018 14:47:42 +0000

By now, many enterprise decision-makers are familiar with the concept of digital extortion, particularly in the form of ransomware. These encryption-based attacks lock users out of their sensitive and valuable data, applications and operating systems. Attackers demand a ransom in the form of untraceable digital currency for the decryption key – which may or may…

The post How Digital Extortion Impacts Today’s Enterprises appeared first on .

Read more