Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking

Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.

The post Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking appeared first on Security Intelligence.

Continue reading Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking

How Can Security Leaders Maintain Control of Privileged Accounts?

When users are granted inappropriate access to privileged accounts, they open the entire IT environment to vulnerabilities — and make it easier for malicious actors to infiltrate corporate networks.

The post How Can Security Leaders Maintain Control of Privileged Accounts? appeared first on Security Intelligence.

Continue reading How Can Security Leaders Maintain Control of Privileged Accounts?

It’s Time to Bring Cloud Environments Out of the Shadows

Business leaders often rush to migrate corporate assets to cloud environments to boost productivity and lower costs, but adopting cloud services without proper oversight can put data at risk.

The post It’s Time to Bring Cloud Environments Out of the Shadows appeared first on Security Intelligence.

Continue reading It’s Time to Bring Cloud Environments Out of the Shadows

Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats

To defend their confidential data from increasingly sophisticated cybercriminals, security teams must leverage machine learning to perform analytical tasks that are too tedious for humans to complete.

The post Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats appeared first on Security Intelligence.

Continue reading Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats

Deception Technologies: Deceiving the Attacker or the Buyer?

Deception technologies, over the last three-ish years, have come into vogue; with more than a dozen commercial vendors and close to a hundred open source products available to choose from. Solutions range from local host canary file monitoring, through… Continue reading Deception Technologies: Deceiving the Attacker or the Buyer?

Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes!

There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.

The post Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes! appeared first on Security Intelligence.

Continue reading Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes!

Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes!

There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.

The post Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes! appeared first on Security Intelligence.

Continue reading Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes!

Massive Identity Data Exposure Leads to Rising Tides of New Account Fraud — What’s Next?

New account fraud is rising in popularity among cybercriminals due to the frequency with which users are opening new online banking accounts.

The post Massive Identity Data Exposure Leads to Rising Tides of New Account Fraud — What’s Next? appeared first on Security Intelligence.

Continue reading Massive Identity Data Exposure Leads to Rising Tides of New Account Fraud — What’s Next?

Just a Passing Fad? Fidget Spinners and the Malware Sandbox

A traditional malware sandbox running OS-level analysis is prone to missing sophisticated threats and advanced evasion techniques.

The post Just a Passing Fad? Fidget Spinners and the Malware Sandbox appeared first on Security Intelligence.

Continue reading Just a Passing Fad? Fidget Spinners and the Malware Sandbox