Try These Best Practices to Counter Common Cybersecurity Risks

Since the beginning of the pandemic, ransomware and other cyber attacks have spiked. Meanwhile, millions of people have shifted from working in offices to working remotely. Organizations are increasingly relying on video conferencing, virtual private networks (VPNs) and remote desktop protocol admin tools. Many employers believe that, to cut down on these risks, they should […]

The post Try These Best Practices to Counter Common Cybersecurity Risks appeared first on Security Intelligence.

Continue reading Try These Best Practices to Counter Common Cybersecurity Risks

Try These Best Practices to Counter Common Cybersecurity Risks

Since the beginning of the pandemic, ransomware and other cyber attacks have spiked. Meanwhile, millions of people have shifted from working in offices to working remotely. Organizations are increasingly relying on video conferencing, virtual private networks (VPNs) and remote desktop protocol admin tools. Many employers believe that, to cut down on these risks, they should […]

The post Try These Best Practices to Counter Common Cybersecurity Risks appeared first on Security Intelligence.

Continue reading Try These Best Practices to Counter Common Cybersecurity Risks

5 Unique Online Scams and How to Defend Against Them

The possibility of an online scam can be an ever-changing problem for individuals and businesses. If someone clicks on a virus-laden email while employed in a data-heavy business, their stolen data could lead to a compromise to the business overall. Because of this, knowing what your employees might encounter in their day to day is […]

The post 5 Unique Online Scams and How to Defend Against Them appeared first on Security Intelligence.

Continue reading 5 Unique Online Scams and How to Defend Against Them

The Story of FakeChat

Starting late December 2020, IBM Trusteer’s mobile threat research lab discovered and began closely tracking a new Android banking malware that appeared to be mostly targeting users in Spain. Per our analysis, the purpose of the malware is to steal credit card numbers, bank account credentials and other private information from its victims. Once a […]

The post The Story of FakeChat appeared first on Security Intelligence.

Continue reading The Story of FakeChat

The Sodinokibi Chronicles: A (R)Evil Cybercrime Gang Disrupts Organizations for Trade Secrets and Cash

It likes big game hunting, it enjoys deploying Cobalt Strike and it dabbles in critical vulnerability abuse. It’s known as Sodinokibi/REvil, a ransomware strain that emerged in 2019 as the heir to the GandCrab ransomware, a malware family that supposedly retired from the cyber crime arena in mid-2019 after reportedly amassing illicit profits of over […]

The post The Sodinokibi Chronicles: A (R)Evil Cybercrime Gang Disrupts Organizations for Trade Secrets and Cash appeared first on Security Intelligence.

Continue reading The Sodinokibi Chronicles: A (R)Evil Cybercrime Gang Disrupts Organizations for Trade Secrets and Cash

Internet of Threats: IoT Botnets Drive Surge in Network Attacks

As Internet of things (IoT) devices in homes, industrial environments, transportation networks and elsewhere continue to proliferate, so does the attack surface for malicious IoT network attackers. IoT attack activity in 2020 dramatically surpassed the combined volume of IoT activity observed by IBM Security X-Force in 2019. Turning our attention to the factors behind this […]

The post Internet of Threats: IoT Botnets Drive Surge in Network Attacks appeared first on Security Intelligence.

Continue reading Internet of Threats: IoT Botnets Drive Surge in Network Attacks

Combating Sleeper Threats With MTTD

During the SolarWinds Orion supply chain compromise, threat actors lurked in the victim’s network for more than a year. Discovered by FireEye in December 2020, the earliest traces of a modified SolarWinds Orion go back as early as October 2019. Although these early versions did not contain the malicious backdoor (this was added in March […]

The post Combating Sleeper Threats With MTTD appeared first on Security Intelligence.

Continue reading Combating Sleeper Threats With MTTD

IBM Named a Strong Performer in The Forrester Wave™: External Threat Intelligence Services, Q1 2021

How can organizations keep up with today’s evolving threat landscape, highlighted by targeted phishing attacks, profit-seeking ransomware and advanced persistent threats (APTs)? The simple answer is better threat intelligence. Please stop me if this is something you’ve heard before. As cyberattacks continue to become more wide-ranging and complex, so too has the type of threat […]

The post IBM Named a Strong Performer in The Forrester Wave™: External Threat Intelligence Services, Q1 2021 appeared first on Security Intelligence.

Continue reading IBM Named a Strong Performer in The Forrester Wave™: External Threat Intelligence Services, Q1 2021

New Vizom Malware Discovered Targets Brazilian Bank Customers with Remote Overlay Attacks

IBM Security Trusteer researchers have discovered a new malware code and active campaign targeting online banking users in Brazil. The malware, coined “Vizom” by the team, uses familiar remote overlay attack tactics to take over user devices in real time, as the intended victim logs in, and then initiates fraudulent transactions from their bank account. […]

The post New Vizom Malware Discovered Targets Brazilian Bank Customers with Remote Overlay Attacks appeared first on Security Intelligence.

Continue reading New Vizom Malware Discovered Targets Brazilian Bank Customers with Remote Overlay Attacks

6 Ransomware Trends You Should Watch for in 2020

A ransomware infection can have a significant financial impact on an organization. American digital security and data backup firm Datto found that ransomware is costing businesses more than $75 billion a year. Part of that financial impact results from downtime costs. Govtech also revealed that businesses lost an average of $8,500 per hour as the […]

The post 6 Ransomware Trends You Should Watch for in 2020 appeared first on Security Intelligence.

Continue reading 6 Ransomware Trends You Should Watch for in 2020