How Companies Can Prepare for Botnet Attacks on APIs

Organizations aren’t slowing down in their use of application programming interfaces (APIs). According to a survey covered by DEVOPSdigest, 61.3% of organizations used more APIs in 2020 than they did a year earlier. An even greater proportion (71.3%) said they plan to use even more APIs in 2021. Another 21.2% expected to use the same […]

The post How Companies Can Prepare for Botnet Attacks on APIs appeared first on Security Intelligence.

Continue reading How Companies Can Prepare for Botnet Attacks on APIs

White House weighs cracking down on secret ransomware payments, pursuing hackers

Going on offense against attackers and penetrating the secrecy surrounding attacks are two ways the Biden administration is pondering to tackle ransomware, a top White House official said on Tuesday. Anne Neuberger, the deputy national security adviser, said that that a joint FBI, U.S. Cyber Command and private sector effort to cripple the Trickbot botnet, a hacking tool that U.S. officials had feared would disrupt 2020 election season, should be the kind of operation used to tackle ransomware gangs in the future. “Certainly that serves as a model to say where we identify actors and infrastructure that are used … to conduct ransomware attacks, we want to ensure that we make it a lot harder for those actors to operate,” Neuberger said at an event hosted by the Silverado Policy Accelerator, a nonprofit think tank. In advance of the 2020 election, Cyber Command and Microsoft led missions to weaken Trickbot, […]

The post White House weighs cracking down on secret ransomware payments, pursuing hackers appeared first on CyberScoop.

Continue reading White House weighs cracking down on secret ransomware payments, pursuing hackers

Organized Crime and How it Can Digitally Affect Your Business

In a post-pandemic world riddled with digital attacks and a hyper-partisan political landscape, access to accurate and vetted intelligence is like finding a needle in a haystack. But intelligence is a critical resource in the fight to stay current wit… Continue reading Organized Crime and How it Can Digitally Affect Your Business

A botnet named after Prometheus jumps is also exploiting Exchange Server flaws

Sometimes a glaring new software vulnerability is all that scammers need to revive a trusty hacking scheme.  Just days after Microsoft announced that suspected Chinese spies were exploiting bugs in Microsoft Exchange Server software in March, Russian-speaking attackers controlling a botnet, or army of compromised computers, used those vulnerabilities to conduct a series of intrusions at companies in North America, according to incident responders at security firm Cybereason. The hacks, which are among several breaches involving the Exchange Server vulnerabilities, show how the same bugs in widely used software can be used for very different purposes. And the reemergence of the so-called Prometei botnet, named after the Russian word for Prometheus, the Greek god of fire, is a reminder of the many malicious purposes that the zombie computers serve. Cybereason said it was aware of more than a dozen recent hacking incidents involving the Prometei botnet, which the attackers typically use […]

The post A botnet named after Prometheus jumps is also exploiting Exchange Server flaws appeared first on CyberScoop.

Continue reading A botnet named after Prometheus jumps is also exploiting Exchange Server flaws

Important Strategies for Aligning Security With Business Objectives

What is the objective of implementing cybersecurity in a business? The answer might vary depending on whether you ask a security professional or a business executive.
However, in any cybersecurity implementation, it’s very important to stay focus… Continue reading Important Strategies for Aligning Security With Business Objectives

Dancho Danchev’s Blog – Proprietary MISP (Malware Information Sharing Platform) Instance Running – Request Access Today!

Dear blog readers,This is Dancho. I wanted to let everyone know that I’ve recently started running a proprietary MISP (Malware Information Sharing Platform) instance where I distribute and share most of my proprietary research with a variety of third-p… Continue reading Dancho Danchev’s Blog – Proprietary MISP (Malware Information Sharing Platform) Instance Running – Request Access Today!

IoT Botnets: Perspectives from a Residential Router

Residential routers face risks from the propagation of IoT botnets and the problem devices present once they are infected.
The post IoT Botnets: Perspectives from a Residential Router appeared first on Radware Blog.
The post IoT Botnets: Perspectives … Continue reading IoT Botnets: Perspectives from a Residential Router

Illegal Content and the Blockchain

Security researchers have recently discovered a botnet with a novel defense against takedowns. Normally, authorities can disable a botnet by taking over its command-and-control server. With nowhere to go for instructions, the botnet is rendered useless… Continue reading Illegal Content and the Blockchain