Threats target financial institutions, fintech, and cryptocurrencies

Credit to Author: Pieter Arntz| Date: Fri, 10 May 2019 15:00:00 +0000

Losing trust in financial institutions can have a disrupting effect on society. And malware authors love to target these direct sources of money. How can we protect them?

Categories:

Tags:

(Read more…)

The post Threats target financial institutions, fintech, and cryptocurrencies appeared first on Malwarebytes Labs.

Read more

Vital infrastructure: Threats target financial institutions, fintech, and cryptocurrencies

Credit to Author: Pieter Arntz| Date: Fri, 10 May 2019 15:00:00 +0000

Losing trust in financial institutions can have a disrupting effect on society. And malware authors love to target these direct sources of money. How can we protect them?

Categories:

Tags:

(Read more…)

The post Vital infrastructure: Threats target financial institutions, fintech, and cryptocurrencies appeared first on Malwarebytes Labs.

Read more

A week in security (April 22 – 28)

Credit to Author: Malwarebytes Labs| Date: Mon, 29 Apr 2019 15:31:03 +0000

A roundup of security news from April 22–28, covering phishing, CCTV evasion, VPNs, and keeping data safe.

Categories:

Tags:

(Read more…)

The post A week in security (April 22 – 28) appeared first on Malwarebytes Labs.

Read more

Labs Cybercrime Tactics and Techniques report finds businesses hit with 235 percent more threats in Q1

Credit to Author: Wendy Zamora| Date: Thu, 25 Apr 2019 07:01:32 +0000

The Labs team discovered that businesses are being targeted with 235 percent more threats than the previous year. Download the report and find out which threats are revving up, and which are dying out.

Categories:

Tags:

(Read more…)

The post Labs Cybercrime Tactics and Techniques report finds businesses hit with 235 percent more threats in Q1 appeared first on Malwarebytes Labs.

Read more

Compromising vital infrastructure: water management

Credit to Author: Pieter Arntz| Date: Mon, 01 Apr 2019 15:00:00 +0000

Water management is an essential part of our infrastructure. Loss of it can lead to service outages, diseases, and famine. So the cybersecurity should be top notch.

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: water management appeared first on Malwarebytes Labs.

Read more

A week in security (March 11 – 17)

Credit to Author: Malwarebytes Labs| Date: Mon, 18 Mar 2019 14:57:10 +0000

A roundup of security news from March 11–17 covering our most recent blogs and other news, including Lazarus Group, Emotet, PSD2, reputation management, Google’s Nest, and Firefox Send.

Categories:

Tags:

(Read more…)

The post A week in security (March 11 – 17) appeared first on Malwarebytes Labs.

Read more

Emotet revisited: pervasive threat still a danger to businesses

Credit to Author: Pieter Arntz| Date: Thu, 14 Mar 2019 15:00:00 +0000

Emotet is often mentioned as one of the most annoying, effective, and costly present-day malware infections. We discuss the reasons why and the proper way to remove it.

Categories:

Tags:

(Read more…)

The post Emotet revisited: pervasive threat still a danger to businesses appeared first on Malwarebytes Labs.

Read more

GandCrab 101: All about the most widely distributed ransomware of the moment

Credit to Author: Luca Nagy| Date: Tue, 05 Mar 2019 14:00:10 +0000

In this Sophos101 report, we’ll give you the lowdown on what you need to know about this, unfortunately, widely disseminated malware.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/QbQ2o1iJn68″ height=”1″ width=”1″ alt=””/>

Read more

Emotet 101, stage 5: a delivery vehicle for more malware

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:59:17 +0000

By SophosLabs Research Emotet is a botnet in its own right, one so prolific and dominant that the United States CERT, the body tasked with tracking cyberthreats to the country, named Emotet in July, 2018 &#8220;among the most costly and destructive malware&#8221; to affect governments, enterprises and organizations large and small, and individual computer users. [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/A9JdHdI4I94″ height=”1″ width=”1″ alt=””/>

Read more

Emotet 101, stage 4: command and control

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:58:33 +0000

By SophosLabs Research The Emotet family could not do what it does without receiving a constant stream of instructions from its owners, or in the absence of the detailed level of feedback about its operating environment each bot sends home from an infected host machine. It also uses huge numbers of compromised websites that belong [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/tuvtIYBP4JI” height=”1″ width=”1″ alt=””/>

Read more