13 Retail Payment Security Tips for Safe 2019 Holiday Shopping

The holiday shopping season brings a spike in payment security threats for both consumers and retailers. Here are 13 ways to protect your sensitive data against retail cybercrime this year.

The post 13 Retail Payment Security Tips for Safe 2019 Holiday Shopping appeared first on Security Intelligence.

Continue reading 13 Retail Payment Security Tips for Safe 2019 Holiday Shopping

Credential-Stuffing Attacks Are Just the Tip of the Iceberg

Credential-stuffing attacks are indicative of the much larger issue of account takeover. Adaptive authentication can help improve the digital experience for low-risk users.

The post Credential-Stuffing Attacks Are Just the Tip of the Iceberg appeared first on Security Intelligence.

Continue reading Credential-Stuffing Attacks Are Just the Tip of the Iceberg

Zebrocy’s Multilanguage Malware Salad

Zebrocy is Russian speaking APT that presents a strange set of stripes. Essentially, at our SAS2019 presentation, we publicly provided original insights on Zebrocy and their characteristics for the first time, based on five years of research and private reports on this group. Continue reading Zebrocy’s Multilanguage Malware Salad

Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security

Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.

The post Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security appeared first on Security Intelligence.

Continue reading Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security

Bots and botnets in 2018

Due to the wide media coverage botnets activities have become largely associated with DDoS attacks. Yet this is merely the tip of the iceberg, and botnets are used widely not only to carry out DDoS attacks, but to steal various user information. Continue reading Bots and botnets in 2018

Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems

Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.

The post Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems appeared first on Security Intelligence.

Continue reading Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems

Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security

While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.

The post Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security appeared first on Security Intelligence.

Continue reading Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security

Threats to users of adult websites in 2018

We examined malware disguised as pornographic content, and malware that hunts for credentials to access pornography websites. We looked at the threats that are attacking users across the internet in order to find out which popular websites might be dangerous to visit. Additionally, we checked our phishing and spam database to see if there is a lot of pornographic content on file and how is it used in the wild. Continue reading Threats to users of adult websites in 2018

Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors

Since governments have so many potential attack vectors to manage, government cybersecurity professionals need clear processes, procedures and authority to harden vulnerable environments.

The post Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors appeared first on Security Intelligence.

Continue reading Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors

IBM X-Force Delves Into ExoBot’s Leaked Source Code

IBM X-Force researchers unpacked ExoBot’s inner workings to reveal insights into its dynamic mechanisms and the features that help criminals use it in cross-channel bank fraud schemes.

The post IBM X-Force Delves Into ExoBot’s Leaked Source Code appeared first on Security Intelligence.

Continue reading IBM X-Force Delves Into ExoBot’s Leaked Source Code