Intelligent Adversary Engagement: Deceiving the Attacker

Traditional security isn’t always enough to keep attackers at bay. When it comes to sneaking into networks, detection will often only come after malicious traffic reaches systems such as next-generation firewalls and intrusion detection and prevention systems. Meanwhile, threat actors have free range. But if you can trick the attacker attempting to trick you, it’s […]

The post Intelligent Adversary Engagement: Deceiving the Attacker appeared first on Security Intelligence.

Continue reading Intelligent Adversary Engagement: Deceiving the Attacker

Injection Vulnerabilities – 20 Years and Counting

Injection vulnerabilities are one of the oldest exploitable software defects, which unfortunately are still prevalent today. Doing a simple search on cve.mitre.org com for the term injection returns with over 10,852 injection-related vulnerabilities in… Continue reading Injection Vulnerabilities – 20 Years and Counting

I Can’t Believe Mirais: Tracking the Infamous IoT Malware

Mirai malware is often perceived as a low-risk threat to enterprise security, but consumer devices in the home, when connected to corporate networks, can expose corporate networks to botnet attacks.

The post I Can’t Believe Mirais: Tracking the Infamous IoT Malware appeared first on Security Intelligence.

Continue reading I Can’t Believe Mirais: Tracking the Infamous IoT Malware

Cryptojacking Attacks: Who’s Mining on Your Coin?

X-Force data revealed that while browser-based cryptojacking was increasingly popular through most of 2018, cryptomining malware made a resurgence at the end of 2018 and into Q1 2019.

The post Cryptojacking Attacks: Who’s Mining on Your Coin? appeared first on Security Intelligence.

Continue reading Cryptojacking Attacks: Who’s Mining on Your Coin?

IcedID Banking Trojan Spruces Up Injection Tactics to Add Stealth

IBM X-Force analyzed modifications made to IcedID that help the banking Trojan act more stealthily on infected devices.

The post IcedID Banking Trojan Spruces Up Injection Tactics to Add Stealth appeared first on Security Intelligence.

Continue reading IcedID Banking Trojan Spruces Up Injection Tactics to Add Stealth

Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019?

The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms.

The post Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019? appeared first on Security Intelligence.

Continue reading Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019?