Cybercriminals Deploy New Malware to Steal Data via Android’s Near Field Communication (NFC)

A new malware called NGate allows cybercriminals to steal near field communication data from Android phones via sophisticated social engineering. The data is relayed to the fraudsters before being used to steal cash. Continue reading Cybercriminals Deploy New Malware to Steal Data via Android’s Near Field Communication (NFC)

StormBamboo Compromises ISP, Spreads Malware

Read more about a China-aligned cyberespionage threat actor dubbed StormBamboo, also known as Evasive Panda, which compromised an Internet Service Provider and infected targets with malware. Continue reading StormBamboo Compromises ISP, Spreads Malware

Cisco Talos: Top Ransomware TTPs Exposed

Read about the new Cisco Talos report on the top ransomware groups’ techniques and learn how to mitigate this cybersecurity risk. Cisco Talos observed the TTPs used by 14 of the most prevalent ransomware groups based on their volume of attack, impact t… Continue reading Cisco Talos: Top Ransomware TTPs Exposed

Mandiant Report: Snowflake Users Targeted for Data Theft and Extortion

A threat actor exploited the Snowflake platform to target organizations for data theft and extortion using compromised credentials. Learn how to protect your business from this threat. Continue reading Mandiant Report: Snowflake Users Targeted for Data Theft and Extortion

Cisco Talos: LilacSquid Threat Actor Targets Multiple Sectors Worldwide With PurpleInk Malware

Find out how the cyberespionage threat actor LilacSquid operates, and then learn how to protect your business from this security risk. Continue reading Cisco Talos: LilacSquid Threat Actor Targets Multiple Sectors Worldwide With PurpleInk Malware

Proofpoint’s CISO 2024 Report: Top Challenges Include Human Error & Risk

This new report also indicates an increasing attack surface as putting pressure on CISOs. One positive note is CISOs’ improving relationships with board members. Continue reading Proofpoint’s CISO 2024 Report: Top Challenges Include Human Error & Risk

IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries

Find out how Grandoreiro banking trojan campaigns work and the countries targeted, as well as how to mitigate this malware threat. Continue reading IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries