Archive

A recent spate of attacks using phishing, social engineering, exploits, and obfuscation are being used to spread a Quant Loader trojan capable of distributing ransomware and password stealers. Researchers at Barracuda last month began spotting malicious zipped Microsoft internet shortcut

Malwarebytes researchers discovered a weakness in the LockCrypt ransomware which enabled them to recover victim’s files. The malware has remained more or less under the radar since June 2017 and is spread via RDP brute-force attacks that must be manually

Mobile Device Management (MDM) is an issue for companies that employ wireless devices. Those devices include smartphones and tablets that communicate through a cellphone network and wifi-enabled office equipment such as mobile printers and scanners. Point-of-sales devices and barcode readers

DUBAI (Reuters) – Hackers have attacked networks in a number of countries including data centers in Iran where they left the image of a U.S. flag on screens along with a warning: “Don’t mess with our elections”, the Iranian IT

Ransomware has been around for a few years, but it has become an albatross around everyone’s neck, targeting big businesses, hospitals, financial institutions and individuals worldwide and extorting millions of dollars. Last year, we saw some major ransomware outbreaks, including

Airbnb is notifying its users in China that the company will share guest’s information with authorities to comply with national laws and regulations. The update was sent to those with listings in China to information them that Airbnb China may

Security researchers have warned that hackers are using badly-configured Cisco switches to gain entry into the infrastructure of organisations worldwide. According to a blog post by the Cisco Talos team threat actors have leveraged a protocol misuse issue in the

Securing the data in your Enterprise Resource Planning (ERP) system is crucial for the survival and success of your business. With such a large amount of data stored in one system, however, it can easily pose the risk of a

TrapX Security®, the global leader in deception-based advanced cybersecurity defense, is collaborating with Check Point Software Technologies Ltd. (NASDAQ: CHKP) to provide a real-time visibility, threat detection, and rapid threat containment solution for both internal networks and cloud deployments. By

Lord & Taylor and Saks Fifth Avenue announced Sunday that 5 million of their customers suffered a data breach, with cybercriminals stealing credit and debit card information. The breach affected Hudson’s Bay Co., which owns both chains, in its North

A hardware wallet for virtual currencies with millions of users has been compromised by a 15-year-old security researcher. Saleem Rashid explained how he cracked the firmware on the wallet produced by Ledger in an online post Tuesday. Rashid performed what’s

Cloudflare decided to use April Fool’s Day (4/1) to share some news about four 1’s that could help speed your internet browsing. The company announced today that it’s launching a DNS service for consumers called 1.1.1.1 The company’s tool —