MuddyWater APT Hones an Arsenal of Custom Tools
The attack group shows a moderate level of sophistication, but the stage is set for MuddyWater to take things to the next level. Continue reading MuddyWater APT Hones an Arsenal of Custom Tools
Collaborate Disseminate
The attack group shows a moderate level of sophistication, but the stage is set for MuddyWater to take things to the next level. Continue reading MuddyWater APT Hones an Arsenal of Custom Tools
Data exfiltration via side channel attacks can be a fascinating topic. It is easy to forget that there are so many different ways that electronic devices affect the physical world other than their intended purpose. And creative security researchers like to play around with these side-effects for ‘fun and profit’. …read more
As the perimeter shifts to the user and application, traditional network-based data loss prevention solutions are no longer effective. There is no longer a central network egress point to control the flow of data, as users, and the applications they ac… Continue reading Insider Threat Management – Detect and Respond to Data Exfiltration
As the perimeter shifts to the user and application, traditional network-based data loss prevention solutions are no longer effective. There is no longer a central network egress point to control the flow of data, as users, and the applications they ac… Continue reading Insider Threat Management – Detect and Respond to Data Exfiltration
Have your business try Cynet’s Free Threat Assessment that checks for malware, C&C connections, data exfiltration, phishing link access, user credential thefts attempts, etc. Continue reading Free Cynet Threat Assessment for Mid-sized and Large Organizations
Multiple hardcoded passwords allow attackers to create badges to gain building entry, access video surveillance feeds, manipulate databases and more. Continue reading IDenticard Zero-Days Allow Corporate Building Access, Location Recon
Near-field communication (NFC) is a set of protocols that enables two electronic devices to establish communication by bringing them very close together. Usually the devices must be within less than 4cm. Contactless payment systems use NFC devices, inc… Continue reading NFCdrip: Data Exfiltration Research in Near Field Communication
By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats.
The post 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics appeared first on Security Intelligence.
Continue reading 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics
Smart bulbs are widely known as a successful offering in home automation and IoT products, as they are internet-capable light bulbs that allow home users to customize the colors, schedule on and off times, and control them remotely. Some even play musi… Continue reading Smart Bulb Offers Light, Color, Music, and… Data Exfiltration?
One of the best ways for cybercriminals to deliver a payload on your organization’s network is to smuggle it inside your employees’ mobile apps.
The post How to Stop Mobile Apps That Steal appeared first on Security Intelligence.