New ZE Loader Targets Online Banking Users

IBM Trusteer closely follows developments in the financial cyber crime arena. Recently, we discovered a new remote overlay malware that is more persistent and more sophisticated than most current-day codes. In this post we will dive into the technical details of the sample we worked on and present ZE Loader’s capabilities and features. The parts […]

The post New ZE Loader Targets Online Banking Users appeared first on Security Intelligence.

Continue reading New ZE Loader Targets Online Banking Users

Automation is not here to close the cybersecurity skills shortage gap, but it can help

In this interview with Help Net Security, Daniel Clayton, VP Global Security Services and Support at Bitdefender, talks about the cybersecurity skills shortage gap and the role of automation in improving the work of cybersecurity professionals. It is c… Continue reading Automation is not here to close the cybersecurity skills shortage gap, but it can help

Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up

Speed is of the essence in digital defense. As the latest Ponemon Institute Cost of a Data Breach Report makes clear, businesses and agencies that are able to respond to and contain an incident rapidly will save millions over their slower peers. The average total cost of a data breach increased by nearly 10%, the largest […]

The post Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up appeared first on Security Intelligence.

Continue reading Cybersecurity Solutions to Know in 2021: Open Source and Scaling Up

Detection evasion in CLR and tips on how to detect such attacks

In this article we demonstrate a detection evasion technique using CLR that may be useful for penetration testing as well as a couple of tips for SOCs to help detect such attacks. Continue reading Detection evasion in CLR and tips on how to detect such attacks

Detection evasion in CLR and tips on how to detect such attacks

In this article we demonstrate a detection evasion technique using CLR that may be useful for penetration testing as well as a couple of tips for SOCs to help detect such attacks. Continue reading Detection evasion in CLR and tips on how to detect such attacks

A Journey in Organizational Cyber Resilience Part 2: Business Continuity

Keeping a business up and running during a problem takes the right people for the job. When it comes to cyber resilience through tough times, many things come down to the human factor. We focused on that in the first piece in this series, but it also makes a big difference to the second topic: […]

The post A Journey in Organizational Cyber Resilience Part 2: Business Continuity appeared first on Security Intelligence.

Continue reading A Journey in Organizational Cyber Resilience Part 2: Business Continuity

How to Protect Against Deepfake Attacks and Extortion

Cybersecurity professionals are already losing sleep over data breaches and how to best protect their employers from attacks. Now they have another nightmare to stress over — how to spot a deepfake.  Deepfakes are different because attackers can easily use data and images as a weapon. And those using deepfake technology can be someone from […]

The post How to Protect Against Deepfake Attacks and Extortion appeared first on Security Intelligence.

Continue reading How to Protect Against Deepfake Attacks and Extortion

How Estonia Created Trust in Its Digital-Forward Government

Cities are becoming smarter every day, and many state and local governments are pushing towards the digitalization of public services. Some North American cities are working hard to integrate online services and manage cybersecurity risk at the same time. Meanwhile, perhaps the best example of a digital city is in fact a digital country.  The […]

The post How Estonia Created Trust in Its Digital-Forward Government appeared first on Security Intelligence.

Continue reading How Estonia Created Trust in Its Digital-Forward Government

Ransomware preparedness is low despite executives’ concerns

86.7% of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a recent Deloitte poll. And while 64.8% of polled executives say that ransomware is a cyber… Continue reading Ransomware preparedness is low despite executives’ concerns

Why your threat hunting program building shouldn’t stop once the engagement is over

Let’s see, it looks like your organization just met an annual Threat Hunting assessment compliance requirement or achieved the introductory objective of experiencing a formal Threat Hunting assessment. Well done! Now, what should the organization take into consideration after successfully completing the assessment? Once a third-party Threat Hunting assessment concludes, many organizations may feel overwhelmed…

The post Why your threat hunting program building shouldn’t stop once the engagement is over appeared first on TrustedSec.

Continue reading Why your threat hunting program building shouldn’t stop once the engagement is over