Attacking Containers and runC

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 12 Feb 2019 19:22:35 +0000

This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and container environment. Here, the attack…

The post Attacking Containers and runC appeared first on .

Read more

Incident Response In The Public Eye

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 31 Dec 2018 17:00:44 +0000

Cyberattacks happen constantly. Every day organizations are attackers online whether they realize it or not. Most of these attacks are passing affairs. The mere fact that systems are on to the internet makes them a target of opportunity. For the most part, these attacks are non-events. Security software, bugs in attack code, and updated applications…

The post Incident Response In The Public Eye appeared first on .

Read more

How threat actors are using SMB vulnerabilities

Credit to Author: Pieter Arntz| Date: Fri, 14 Dec 2018 16:00:00 +0000

SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.

Categories:

Tags:

(Read more…)

The post How threat actors are using SMB vulnerabilities appeared first on Malwarebytes Labs.

Read more

This Week in Security News: Security Predictions and Malware Attacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 14 Dec 2018 18:20:36 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the span of categories for Trend Micro’s 2019 Security Predictions. Also, learn about a new exploit kit that targets home or small office routers which attacks…

The post This Week in Security News: Security Predictions and Malware Attacks appeared first on .

Read more

Research Drives Protection

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 13 Nov 2018 15:00:35 +0000

The threat landscape has changed often in the 22 years I’ve been working at Trend Micro and it will continue to change for many more years. We in cybersecurity are constantly at battle with hackers and threat actors who look to infect our customers using the many tactics available to them. Our job is to…

The post Research Drives Protection appeared first on .

Read more

Which Threats had the Most Impact During the First Half of 2018?

Credit to Author: Trend Micro| Date: Mon, 05 Nov 2018 15:00:50 +0000

One of the best ways for organizations to shore up their data security efforts and work toward more proactive protection is by examining trends within the threat environment. Taking a look at the strategies for attack, infiltration and infection currently being utilized by hackers can point toward the types of security issues that will continue…

The post Which Threats had the Most Impact During the First Half of 2018? appeared first on .

Read more

Safeguarding the Nation’s Critical Infrastructure

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Mon, 22 Oct 2018 14:43:06 +0000

In May of 1998, President Clinton issued Presidential Decision Directive 63: Protecting America’s Critical Infrastructures. This Directive proposed steps to enact the recommendations of the President’s Commission on Critical Infrastructure Protection, published in October 1997. Twenty years on, how are things going? The US Federal government has identified critical infrastructure sectors and associated each with…

The post Safeguarding the Nation’s Critical Infrastructure appeared first on .

Read more

A week in security (October 1 – 7)

Credit to Author: Malwarebytes Labs| Date: Mon, 08 Oct 2018 16:31:56 +0000

A roundup of the security news from October 1–7 including National Cybersecurity Awareness Month, LoJack, fileless malware, and BYOS.

Categories:

Tags:

(Read more…)

The post A week in security (October 1 – 7) appeared first on Malwarebytes Labs.

Read more

Millions of accounts affected in latest Facebook hack

Credit to Author: Malwarebytes Labs| Date: Fri, 28 Sep 2018 19:39:11 +0000

Facebook announced earlier today that its social network had been breached, resulting in 40 million accounts that were directly impacted. Learn more as the Facebook breach story develops.

Categories:

Tags:

(Read more…)

The post Millions of accounts affected in latest Facebook hack appeared first on Malwarebytes Labs.

Read more

Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT

Credit to Author: Jérôme Segura| Date: Wed, 26 Sep 2018 17:13:26 +0000

A threat actor implements a newer vulnerability exploited in Internet Explorer to serve up the Quasar RAT and diversify the portfolio of attacks.

Categories:

Tags:

(Read more…)

The post Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT appeared first on Malwarebytes Labs.

Read more