Organizations brace for cyber attacks despite improved preparedness

Cyber-risk levels have improved from “elevated” to “moderate” for the first time, but insiders represent a persistent threat for global organizations, according to Trend Micro. Jon Clay, VP of threat intelligence at Trend Micro:… Continue reading Organizations brace for cyber attacks despite improved preparedness

Malicious PyPI packages drop ransomware, fileless malware

In this Help Net Security video, Ax Sharma, Senior Security Researcher at Sonatype, discusses newly found PyPI packages that pack ransomware, and another package that appears to be safe but silently drops fileless malware to mine cryptocurrency (Monero… Continue reading Malicious PyPI packages drop ransomware, fileless malware

91.5% of malware arrived over encrypted connections during Q2 2021

The latest report from the WatchGuard shows an astonishing 91.5% of malware arriving over encrypted connections during Q2 2021. This is a dramatic increase over the previous quarter and means that any organization that isn’t examining encrypted HTTPS t… Continue reading 91.5% of malware arrived over encrypted connections during Q2 2021

A closer look at fileless malware, beyond the network

Cybersecurity is an arms race, with defensive tools and training pushing threat actors to adopt even more sophisticated and evasive intrusion techniques as they attempt to gain a foothold in victim networks. Most modern endpoint protection (EPP) servic… Continue reading A closer look at fileless malware, beyond the network

TeamTNT Gains Full Remote Takeover of Cloud Instances

Using a legitimate tool called Weave Scope, the cybercrime group is establishing fileless backdoors on targeted Docker and Kubernetes clusters. Continue reading TeamTNT Gains Full Remote Takeover of Cloud Instances

How to protect yourself from the hidden threat of evasive scripts

Evasion techniques are used by cybercriminals to evade detection, and they are especially prevalent in the context of scripts, which on their own have legitimate uses (e.g., to automate processes on a computer system). Unfortunately, scripts can also b… Continue reading How to protect yourself from the hidden threat of evasive scripts

Fileless worm builds cryptomining, backdoor-planting P2P botnet

A fileless worm dubbed FritzFrog has been found roping Linux devices running SSH servers – corporate servers, routers and IoT devices – into a P2P botnet whose apparent goal is to mine cryptocurrency. Simultaneously, though, the malware cre… Continue reading Fileless worm builds cryptomining, backdoor-planting P2P botnet