A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

Credit to Author: Malwarebytes Labs| Date: Thu, 19 Dec 2019 18:03:33 +0000

As the 2010s come to a close, we take a snarky walk down memory lane, listing the craziest, most impactful, or simply just awful cybersecurity fails of the decade.

Categories:

Tags:

(Read more…)

The post A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s appeared first on Malwarebytes Labs.

Read more

Threat spotlight: The curious case of Ryuk ransomware

Credit to Author: Jovi Umawing| Date: Thu, 12 Dec 2019 22:33:53 +0000

From comic book death god to ransomware baddie, Ryuk ransomware remains a mainstay when organizations find themselves in a crippling malware pinch. We look at Ryuk’s origins, attack methods, and how to protect against this ever-present threat.

Categories:

Tags:

(Read more…)

The post Threat spotlight: The curious case of Ryuk ransomware appeared first on Malwarebytes Labs.

Read more

New version of IcedID Trojan uses steganographic payloads

Credit to Author: Threat Intelligence Team| Date: Tue, 03 Dec 2019 18:06:13 +0000

We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.

Categories:

Tags:

(Read more…)

The post New version of IcedID Trojan uses steganographic payloads appeared first on Malwarebytes Labs.

Read more

A week in security (November 25 – December 1)

Credit to Author: Malwarebytes Labs| Date: Mon, 02 Dec 2019 16:23:55 +0000

A roundup of cybersecurity news from November 25 – December 1, including the concept of “data as property”, the increasing creativity of sextortion scammers, and the security risks of switching to “healthcare for all” policies in the US.

Categories:

Tags:

(Read more…)

The post A week in security (November 25 – December 1) appeared first on Malwarebytes Labs.

Read more

Emotet’s Central Position in the Malware Ecosystem

Credit to Author: Andrew Brandt| Date: Mon, 02 Dec 2019 14:01:28 +0000

As the world rolls into another Cyber Monday, and online shoppers continue their hunt for the best deals, SophosLabs wants to remind you that there&#8217;s a metaphorical malware elephant in the room that would like nothing more than to steal financial information, and the use of your computer, for nefarious ends. The Emotet Ecosystem infographic, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/ItFCW7TqIXw” height=”1″ width=”1″ alt=””/>

Read more

Labs report finds cyberthreats against healthcare increasing while security circles the drain

Credit to Author: Wendy Zamora| Date: Wed, 13 Nov 2019 13:00:00 +0000

In this special edition of our quarterly CTNT report, we focus on the top attack methods and threats plaguing the healthcare industry over the last year, plus highlight recurring security challenges and reasons why cybercriminals target patient data.

Categories:

Tags:

(Read more…)

The post Labs report finds cyberthreats against healthcare increasing while security circles the drain appeared first on Malwarebytes Labs.

Read more

Emotet is back: botnet springs back to life with new spam campaign

Credit to Author: Threat Intelligence Team| Date: Mon, 16 Sep 2019 17:04:53 +0000

After months of laying dormant, the notorious Emotet is back, with its botnet spewing spam globally.

Categories:

Tags:

(Read more…)

The post Emotet is back: botnet springs back to life with new spam campaign appeared first on Malwarebytes Labs.

Read more

Secret Service Investigates Breach at U.S. Govt IT Contractor

Credit to Author: BrianKrebs| Date: Mon, 09 Sep 2019 16:47:56 +0000

The U.S. Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. The contractor claims the access being auctioned off was to old test systems that do not have direct connections to its government partner networks. In mid-August, a member of a popular Russian-language cybercrime forum offered to sell access to the internal network of a U.S. government IT contractor that does business with more than 20 federal agencies, including several branches of the military. The seller bragged that he had access to email correspondence and credentials needed to view databases of the client agencies, and set the opening price at six bitcoins (~USD $60,000).

Read more