Variant of Paradise Ransomware Targets Office IQY Files
Threat actors can easily infiltrate networks because attacks evade detection by typical security protections. Continue reading Variant of Paradise Ransomware Targets Office IQY Files
Collaborate Disseminate
Threat actors can easily infiltrate networks because attacks evade detection by typical security protections. Continue reading Variant of Paradise Ransomware Targets Office IQY Files
Agent Tesla and LokiBot are common payloads in the botnet-driven spam effort. Continue reading Advanced Obfuscation Marks Widespread Info-Stealing Campaign
Agent Tesla and LokiBot are common payloads in the botnet-driven spam effort. Continue reading Advanced Obfuscation Marks Widespread Info-Stealing Campaign
The privacy panic over FaceApp, the selfie-editing mobile app that makes photo subjects younger, older or turns them into members of the opposite sex, has been overblown. The (overblown) issue FaceApp is an iOS and Android app developed by Russian comp… Continue reading FaceApp privacy panic: Be careful which apps you use
There’s a new reality to network security, driven by the fact that the perimeter is vanishing. The concept of a network being fully enclosed within a building or virtual organization, and therefore easier to defend, is gone. The concept of a defensible… Continue reading The perimeter is vanishing, how will you secure your network?
A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity — attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malware’s apparent creator seems to have done little to hide his real-life identity. Continue reading Who Is Agent Tesla?
Organizations offering telecommunication services are seeing more advanced malware threats than organizations in other industries, Lastline researchers have found. They have come to that conclusion after having analyzed all the threats seen by the tele… Continue reading Telecom services: Patient zero for email-based attacks?
Lastline announced the results of a survey conducted at Infosecurity Europe 2018, which suggests that 45 percent of infosec professionals reuse passwords across multiple user accounts – a basic piece of online hygiene that the infosec community has bee… Continue reading Many infosec professionals reuse passwords across multiple accounts
When I asked Dr. Giovanni Vigna what are some of the most important lessons he has learned during the 25+ years he spent working in computer security, his answer was simple: always learn by doing and always innovate. “Reading about security is ne… Continue reading Infosec and the future: Dr. Giovanni Vigna on lessons learned over 25 years
Lastline found three separate strains of keylogger malware that are currently targeting finance. Lastline’s analysis of the 100 most recent malware samples found among finance firms uncovered an unusually large number of iSpy keylogger samples, which i… Continue reading Sophisticated keyloggers target the finance industry