Researchers Detect Second Wave of Shellshock Attacks Since Two-Year Anniversary

Researchers detected an increase in Shellshock attacks — the second wave of activity since the malware celebrated its two-year anniversary in September.

The post Researchers Detect Second Wave of Shellshock Attacks Since Two-Year Anniversary appeared first on Security Intelligence.

Continue reading Researchers Detect Second Wave of Shellshock Attacks Since Two-Year Anniversary

Shellshock Anniversary: Major Security Flaw Still Going Strong

As if to celebrate its two-year anniversary, Shellshock, one of the most infamous bugs of 2014, ramped up its activity in September.

The post Shellshock Anniversary: Major Security Flaw Still Going Strong appeared first on Security Intelligence.

Continue reading Shellshock Anniversary: Major Security Flaw Still Going Strong

VBA Macro Malware Jumping on the Ransomware Bandwagon

IBM observed a spike in malware activity that uses Visual Basic for Applications (VBA) macros to deliver malicious attachments.

The post VBA Macro Malware Jumping on the Ransomware Bandwagon appeared first on Security Intelligence.

Continue reading VBA Macro Malware Jumping on the Ransomware Bandwagon

VBA Macro Malware Jumping on the Ransomware Bandwagon

IBM observed a spike in malware activity that uses Visual Basic for Applications (VBA) macros to deliver malicious attachments.

The post VBA Macro Malware Jumping on the Ransomware Bandwagon appeared first on Security Intelligence.

Continue reading VBA Macro Malware Jumping on the Ransomware Bandwagon

Insurance, Assurance and Blockchain: Practical Steps for Market Growth

Blockchain enables insurance companies to streamline internal processes, enhance security posture and expand into new markets with insurance dynamics.

The post Insurance, Assurance and Blockchain: Practical Steps for Market Growth appeared first on Security Intelligence.

Continue reading Insurance, Assurance and Blockchain: Practical Steps for Market Growth

Keeping the Lights On: Security Trends in the Energy and Utilities Industry

The energy and utilities industry is built on a highly regulated framework — but that doesn’t mean it’s immune to the threat of a cyberattack.

The post Keeping the Lights On: Security Trends in the Energy and Utilities Industry appeared first on Security Intelligence.

Continue reading Keeping the Lights On: Security Trends in the Energy and Utilities Industry

Government Data Woes: 2016 Compromised Records Surpass Total for Last Three Years Combined

Government entities in the U.S. and abroad have been targeted by malware infections, phishing schemes, SQL injection attacks and more.

The post Government Data Woes: 2016 Compromised Records Surpass Total for Last Three Years Combined appeared first on Security Intelligence.

Continue reading Government Data Woes: 2016 Compromised Records Surpass Total for Last Three Years Combined

Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation

The transportation industry is a large target for cybercriminals, and the only way to avoid damaging attacks is to be proactive about security.

The post Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation appeared first on Security Intelligence.

Continue reading Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation

Fool Me Once, Shame on You — Fool Me Eight Times, Shame on My Security Posture?

Organizations with weak security posture are an attractive target for cybercriminals, and they may find themselves coming under fire frequently.

The post Fool Me Once, Shame on You — Fool Me Eight Times, Shame on My Security Posture? appeared first on Security Intelligence.

Continue reading Fool Me Once, Shame on You — Fool Me Eight Times, Shame on My Security Posture?

Hacktivism: Fearmongering or Real Threat?

Organizations must be prepared for possible hacktivism campaigns by arming themselves with the best defensive tools and security strategies.

The post Hacktivism: Fearmongering or Real Threat? appeared first on Security Intelligence.

Continue reading Hacktivism: Fearmongering or Real Threat?