As defenses against standard cyberattacks evolve, so do the methods of attack carried out by malicious actors. Security researchers say a type of attack known as steganographic malware is on the rise. Gary Davis, the chief consumer security evangelist at cybersecurity firm McAfee, warned of the relatively new style of attack, which involves embedding secret code… Continue reading “What Is Steganographic Malware? New Type Of Attack Hides In Images”
Hackers with their targets set on devices running Apple’s MacOS are selling access to new, sophisticated attacks that can infect machines and hold them for ransom. The attacks, which include a malware-as-a-service (MaaS) known as MacSpy and a ransomware-as-a-service called MacRansom — both of which attackers can purchase to use to direct at a target— are… Continue reading “Hackers Marketing ‘Most Sophisticated’ Mac Malware Ever”
The world of malware and exploits has a long history, and anyone involved in this industry knows that we are at a tipping point. Threats continue to evolve, from the first viruses seen in the wild back in 1982, to the modern day malware of today that’s capable of spreading laterally in the blink of an eye.
We are in an arms race, and the traditional, legacy ways of dealing with these types of problems just doesn’t cut it anymore. For the last few months I’ve been learning and playing with Palo Alto’s Endpoint Protection solution, aptly entitled Traps. As someone who has worked in the network and cybersecurity industries over the last 20 years, I can tell you, it’s a revolutionary approach to the problem of dealing with these types of attacks. While the industry as a whole has focused on Antivirus (AV) mechanisms and more recently, Endpoint Detection and Response (EDR), Palo Alto is taking an altogether different approach; an approach that in my opinion will ultimately leave these legacy approaches in the dust.
A malware attack dubbed Fireball has infected more than 250 million computers worldwide and is redirecting web browsers on compromised machines to generate revenue for its attackers. First discovered by cybersecurity firm Check Point Threat Intelligence, the browser-hijacking malware attack of Chinese origin has reportedly spread to 20 percent of corporate computer networks. Read: Android Malware:… Continue reading “Chinese Malware ‘Fireball’ Has Infected 250 Million Devices”
Now that the election is behind us, the discussion has turned to potential involvement by foreign governments and whether they had their hand in altering the course of US democracy by tampering with the integrity of our election systems. The CIA has all but admitted that there was definite Russian interference aimed at tilting our election. Continue reading “How to Hack an Election”
Ever get a friend request from someone you don’t know and have never met before? More often than not, these accounts are created by criminals looking to harvest your personal information, or scam you in some other fashion.
It typically starts when you receive a friend request from someone you don’t know. And you have no mutual friends in common:
Republished from Corero DDoS Blog:
The Internet has a very long history of utilizing mechanisms that may breathe new life into older technologies, stretching it out so that newer technologies may be delayed or obviated altogether. IPv4 addressing, and the well known depletion associated with it, is one such area that has seen a plethora of mechanisms employed in order to give it more shelf life.