IT threat evolution Q1 2020
Operation AppleJeus, news about Roaming Mantis, watering-hole websites in Asia, virus blast from the past and other targeted attacks and malware campaigns. Continue reading IT threat evolution Q1 2020
Collaborate Disseminate
Operation AppleJeus, news about Roaming Mantis, watering-hole websites in Asia, virus blast from the past and other targeted attacks and malware campaigns. Continue reading IT threat evolution Q1 2020
The FBI, in cooperation with law enforcement from the UK, Netherlands, Germany and Ireland, seized the WeLeakInfo.com web site for allegedly selling personal information from data breaches. Crafted as a typical search engine, WeLeakInfo.com let users s… Continue reading FBI seizes WeLeakInfo.com website for allegedly selling sensitive data breach info
The popularity of cloud services is growing, and threat actors are here to exploit the trend. Continue reading Corporate security prediction 2020
In this report, we will discuss the numerous information security issues affecting biometric authentication systems and present the results of our own research, to provide additional information for a more objective evaluation of risks associated with using existing biometric authentication system implementations. Continue reading Biometric data processing and storage system threats
Mobile espionage targeting the Middle East, new FinSpy iOS and Android implants, Dtrack banking malware and other security news Continue reading IT threat evolution Q3 2019
It is very common to see cybercriminals exploit vulnerabilities in blogging software such as WordPress and Joomla! for injecting their malicious code. In my research, I decided to investigate this further and see what the current threat landscape looks like by researching the most visited blogs in Sweden. Continue reading The cybercrime ecosystem: attacking blogs
Targeted attacks, malware campaigns and other security news in Q2 2019. Continue reading IT threat evolution Q2 2019
Zebrocy and GreyEnergy, four zero-day vulnerabilities in Windows, attacks on cryptocurrency exchanges, a very old bug in WinRAR, attacks on smart devices and other events of the first quarter of 2019. Continue reading IT threat evolution Q1 2019
Data privacy is taking center stage in countries worldwide. Organizations are strengthening privacy controls in the face of endless data breaches, tighter regulations, stiff penalties and customer pushback. We’re undergoing a major transition from the… Continue reading Keeping Workplace Privacy Accidents to a Minimum
Mobile security has become a top concern for a number of companies, as the average cost of a corporate data breach is $3.86 million. Employees often access and use corporate data through their smartphones, which means protecting sensitive data can be … Continue reading 5 Mobile Security Threats to Recognize