Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.
Read moreFollow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.
Read moreA majority of organizations say the acceleration was driven by a need to support more remote employees.
Read moreBackdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.
Read moreBackdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.
Read moreNew MacOS Ransomware Hides in Pirated Program
July 1 2020A bogus installer for Little Snitch carries a ransomware hitchhiker.
Read moreVulnerabilities had not been exploited or publicly disclosed before fixes were released, Microsoft reports.
Read more4 Steps to a More Mature Identity Program
July 1 2020Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.
Read moreSecuring the International IoT Supply Chain
July 1 2020Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try...
Read moreWhile financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs.
Read more
Recent Comments