The Makings of a Successful Threat-Hunting Program
Over the last few years, an influx of high-profile industry security issues (PDF) have placed offensive tactics among the top priorities for corporations to help mitigate the risk of...
Cybersecurity in a post-pandemic world
With mass vaccination ramping up and the possible end of the pandemic in sight, it’s time to look at how organizations will return to normal in terms of cybersecurity.Once...
NIST releases software, IoT, and consumer cybersecurity labeling guidance
On February 4, the National Institute of Standards and Technology (NIST) issued several documents and updates that spell out software security guidance and recommended consumer labeling practices for software...
WhatsApp Modification Seen Distributing Triada Trojan
A malicious modified version of WhatsApp for Android has been observed spreading the Triada mobile Trojan, which can download additional malware, launch ads, issue subscriptions, and intercept a victim's...
Targeted Attack Activity Heightens Need for Orgs. to Patch New SolarWinds Flaw
A China-based threat actor -- previously observed targeting US defense industrial base organizations and software companies -- is exploiting the bug in SolarWinds' Serv-U software, Microsoft says.Organizations that have...
Microsoft-Signed Rootkit Targets Gaming Environments in China
Researchers have identified a rootkit with a valid digital signature from Microsoft being distributed within gaming environments in China.
The rootkit, called FiveSys, is being used to redirect traffic to...
Black Basta Ransomware Targets ESXi Servers in Active Campaign
The Black Basta ransomware emerged last month to target Windows-based systems only, but now the latest ransomware binary is going after VMware virtual machines (VMs).
The latest variant looks to encrypt VMs...
Chat logs show how Egregor, an $80 million ransomware gang, handled negotiations with little...
Written by Tim Starks Jul 21, 2021 |...