3 essential ways to strengthen your business data security

Credit to Author: Sushmita Kalashikar| Date: Tue, 05 Feb 2019 12:53:26 +0000

For any business big or small, business data is an asset that they cannot afford to compromise at any cost. With a huge amount of data, from employee details to the credit card details of customers, stored in the form of vulnerable electronic records, the loss of even a single…

Read more

A week in security (January 21 – 27)

Credit to Author: Malwarebytes Labs| Date: Mon, 28 Jan 2019 18:00:14 +0000

A roundup of last week’s security news from January 21 to 27, including Modlishka, Crytekk, PUPs, and the State of Malware report.

Categories:

Tags:

(Read more…)

The post A week in security (January 21 – 27) appeared first on Malwarebytes Labs.

Read more

Drone Safety – Flying Tips, Policies & Regulations

Credit to Author: Sunita Saini| Date: Tue, 15 Jan 2019 04:09:29 +0000

Drones Unmanned Aircraft System (UAS)/ Remotely Piloted Aircraft System (RPAS) commonly known as drones/ UAV are unmanned aerial vehicle without a human pilot aboard. The potential of drones is starting to be realized and it is making a big impact. They can take on complex tasks and reduce costs minimizing…

Read more

Beware! Your website might be delivering Emotet malware

Credit to Author: Bajrang Mane| Date: Sat, 29 Dec 2018 08:28:45 +0000

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challenging…

Read more

The complete story of EMOTET: Most prominent Malware of 2018

Credit to Author: Bajrang Mane| Date: Sat, 29 Dec 2018 08:28:45 +0000

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challenging…

Read more

Sophisticated Ransomware : “Katyusha”

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 10:59:58 +0000

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to release the data to public download if the ransom is not…

Read more

CVE-2018-15982- Adobe Flash Player use after free (Zero Day) vulnerability alert!

Credit to Author: Prashant Tilekar| Date: Thu, 06 Dec 2018 10:52:25 +0000

The recent zero-day vulnerability CVE-2018-15982 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-42 on December 5, 2018 to address this issue. According to Adobe, the in-wild exploit is being used in targeted attacks. Vulnerable Versions Adobe…

Read more

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Credit to Author: Pradeep Kulkarni| Date: Thu, 01 Nov 2018 06:17:45 +0000

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering…

Read more

A week in security (October 22 – 28)

Credit to Author: Malwarebytes Labs| Date: Mon, 29 Oct 2018 17:00:00 +0000

A roundup of security news from October 22 to October 28, including more headaches for airlines, how to avoid being a victim of a sextortion scam, and problems with search engines, browsers, and email.

Categories:

Tags:

(Read more…)

The post A week in security (October 22 – 28) appeared first on Malwarebytes Labs.

Read more