Home Blog Page 35
Adversaries constantly look for new techniques to make their phishing attacks more effective; bait attacks are one of those techniques. Most phishers leverage bait attacks to estimate which victim is willing to respond to their phishing scams. The latest report from...
In the first half of 2021, cyber adversaries pried on opportunities to attack enterprise infrastructure and critical industries. Even the slightest security mismanagement motivated them to disrupt operations and exfiltrate data. As the year draws to a close, and...
In the movie Die Hard 4.0, John McClane and a young hacker team up to thwart the plans of cyber-terrorist Thomas Gabriel in Washington D.C. Gabriel’s plan is known as "fire sale" which is a coordinated attack on the...
Cybersecurity researchers at AT&T Labs uncovered a new malware variant targeting routers and IoT devices. Tracked as BotenaGo, the malware is leveraging over 30 exploit methods to compromise the targeted devices, exposing millions of IoT devices and routers to...
With the prevalence of hacker intrusions, the consequences of not addressing the vulnerabilities and other security loopholes in your network systems could be severe. Adversaries often target unpatched vulnerabilities to compromise targeted systems, and one of their most common...
The evolution of new malware variants has become prevalent in the cyberthreat landscape. Cybercriminals continue to create novel malicious codes, botnets, or redesign old malware variants to compromise the targeted networks without getting caught. Cybersecurity solutions provider Check Point...
Costco Wholesale Corporation, a big-box retail store company, discovered a breach at one of its retail store terminals where a card skimming device was being used at the payment counter to skim data. On discovering the payment card skimming device,...
Like creating various malware variants, cybercriminals often find new techniques to deploy malware and evade security scans. As per a report from Microsoft 365 Defender Threat Intelligence Team, adversaries are increasingly relying on HTML smuggling techniques in email phishing and...
In August, the White House hosted a meeting with some of the most powerful CEOs in the world; from Apple to JPMorgan. The topic for discussion? The rampant scourge of software supply chain attacks, which has surged by a...
As the landscape of cyberthreats expands, it is imperative for enterprises to focus on employing security operations center analysts, also known as SOC analysts, to prevent and mitigate cyberattacks. Companies need to envision and revamp or build new SOC...