Marcher Mobile Bot Adds UK Targets, Steps Up Banking Fraud Capabilities

The Marcher mobile bot is a new Android malware targeting a long list of banks around the world with app overlay screens and SMS hijacking.

The post Marcher Mobile Bot Adds UK Targets, Steps Up Banking Fraud Capabilities appeared first on Security Intelligence.

Continue reading Marcher Mobile Bot Adds UK Targets, Steps Up Banking Fraud Capabilities

Bug Poaching: A New Extortion Tactic Targeting Enterprises

Bug poaching may not feel as severe as full-blown advanced attacks that expose your data to the public, but you should treat them just as seriously.

The post Bug Poaching: A New Extortion Tactic Targeting Enterprises appeared first on Security Intelligence.

Continue reading Bug Poaching: A New Extortion Tactic Targeting Enterprises

Insider Attacks May Be Closer Than They Appear

Security policies and employee education are just two of the many ways that organizations can mitigate the threat of insider attacks.

The post Insider Attacks May Be Closer Than They Appear appeared first on Security Intelligence.

Continue reading Insider Attacks May Be Closer Than They Appear

Telnet: An Attacker’s Gateway to the IoT

Savvy cybercriminals are using older technologies such as Telnet to carry out attacks on IoT devices, a recent IBM Security report discovered.

The post Telnet: An Attacker’s Gateway to the IoT appeared first on Security Intelligence.

Continue reading Telnet: An Attacker’s Gateway to the IoT

Footprinting and Brute-Force Attacks Remain Prevalent

With so much attention focused on APTs and mutating malware, it’s easy to overlook brute-force attacks — which can still be successful.

The post Footprinting and Brute-Force Attacks Remain Prevalent appeared first on Security Intelligence.

Continue reading Footprinting and Brute-Force Attacks Remain Prevalent

Understanding EdgeHTML’s Attack Surface and Exploit Mitigations

EdgeHTML’s large attack surface can be daunting for users. Learn more about possible attacks as well as exploit mitigations that enhance security.

The post Understanding EdgeHTML’s Attack Surface and Exploit Mitigations appeared first on Security Intelligence.

Continue reading Understanding EdgeHTML’s Attack Surface and Exploit Mitigations

Time Is Money: GozNym Launches Redirection Attacks in Poland

The GozNym banking Trojan has pivoted its focus from targeting North American institutions to launching redirection attacks in Europe.

The post Time Is Money: GozNym Launches Redirection Attacks in Poland appeared first on Security Intelligence.

Continue reading Time Is Money: GozNym Launches Redirection Attacks in Poland

Reviewing the Cyber Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities

The “IBM 2016 Cyber Security Intelligence Index” reveals IBM X-Force’s collected data on the threat landscape and attack types affecting all industries.

The post Reviewing the Cyber Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities appeared first on Security Intelligence.

Continue reading Reviewing the Cyber Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities