APT attacks targeting Linux, Windows and Android remained undetected for nearly a decade

Five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and mobile devices running Android while remaining undetected for nearly a decade, according to BlackBerry. The repo… Continue reading APT attacks targeting Linux, Windows and Android remained undetected for nearly a decade

Increase in Small DDoS Attacks Could Take Down VPNs

Data breaches and ransomware might hog the headlines, but don’t forget to pay attention to DDoS attacks. According to research from Neustar, DDoS attacks increased by 168% in Q4 2019 compared to the same period in 2018. However, despite a year ago or … Continue reading Increase in Small DDoS Attacks Could Take Down VPNs

DevOps Chats: Free Remote Endpoint Protection From Qualys

Many companies are responding to the large number of people working from home as a result of the public health situation. Qualys has rolled out a totally free 60-day version of its cloud-based security and compliance solution at no charge. We spoke wi… Continue reading DevOps Chats: Free Remote Endpoint Protection From Qualys

Large number of mobile apps may be vulnerable to hacking

A team of cybersecurity researchers has discovered that a large number of mobile apps contain hardcoded secrets allowing others to access private data or block content provided by users. Hidden behaviors within the app The study’s findings: that … Continue reading Large number of mobile apps may be vulnerable to hacking

TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

Our team is closely monitoring TrickBot’s developing capabilities, including its new cross-channel attacks using the TrickMo component.

The post TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany appeared first on Security Intelligence.

Continue reading TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

The cybersecurity implications of working remotely

We sat down with Demi Ben-Ari, CTO at Panorays, to discuss the cybersecurity risks of remote work facilitated by virtual environments. The global spread of the COVID-19 coronavirus has had a notable impact on workplaces worldwide, and many organization… Continue reading The cybersecurity implications of working remotely

Passwords still dominant authentication method, top cause of data breaches

Passwords remain the dominant method of authentication and top cause of data breaches, according to MobileIron. A new report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device o… Continue reading Passwords still dominant authentication method, top cause of data breaches

Devices on 5G networks demand differentiated security solutions

There will be 8.3 billion mobile broadband subscriptions by the end of 2024, which translates to 95 percent of all subscriptions by then, according to the SMU Office of Research & Tech Transfer. Total mobile data traffic will reach 131 exabytes pe… Continue reading Devices on 5G networks demand differentiated security solutions