Threat actor used Vimeo, Ars Technica to serve second-stage malware

A financially motivated threat actor tracked as UNC4990 is using booby-trapped USB storage devices and malicious payloads hosted on popular websites such as Ars Technica, Vimeo, GitHub and GitLab to surreptitiously deliver malware. Another interesting … Continue reading Threat actor used Vimeo, Ars Technica to serve second-stage malware

Most organizations do not follow data backup best practices

Apricorn announced new findings from a survey, which revealed that while the majority organizations have data backup plans in place, data for many are at risk. Nearly 400 veteran IT security practitioners were surveyed, in industries such as healthcare… Continue reading Most organizations do not follow data backup best practices

57% of people can’t recall if they ever backed up their important documents

Apricorn announced findings from a Twitter poll exploring device data and backup processes ahead of World Backup Day on March 31st. When asked to be honest with their admissions regarding when they last backed up the important files and documents on th… Continue reading 57% of people can’t recall if they ever backed up their important documents

OSI Layer 1: The soft underbelly of cybersecurity

As traditional cybersecurity solutions improve, they push cyberattackers toward alternative paths. Layer 1 of the OSI model (i.e., the physical layer) has become a fertile ground for attacks and, effectively, the soft underbelly of cybersecurity. What … Continue reading OSI Layer 1: The soft underbelly of cybersecurity

USB threats could critically impact business operations

According to a report released by Honeywell, USB threats that can severely impact business operations increased significantly during a disruptive year when the usage of removable media and network connectivity also grew. Data from the report indicates … Continue reading USB threats could critically impact business operations

USB storage devices: Convenient security nightmares

There’s no denying the convenience of USB media. From hard drives and flash drives to a wide range of other devices, they offer a fast, simple way to transport, share and store data. However, from a business security perspective, their highly accessibl… Continue reading USB storage devices: Convenient security nightmares

New fuzzing tool for USB drivers uncovers bugs in Linux, macOS, Windows

With a new fuzzing tool created specifically for testing the security of USB drivers, researchers have discovered more than two dozen vulnerabilities in a variety of operating systems. “USBFuzz discovered a total of 26 new bugs, including 16 memo… Continue reading New fuzzing tool for USB drivers uncovers bugs in Linux, macOS, Windows

Majority of IT departments leave major holes in their USB drive security

For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security across the organization, according to Apricorn. The survey report, which pol… Continue reading Majority of IT departments leave major holes in their USB drive security

New user keystroke impersonation attack uses AI to evade detection

A sophisticated attack, called Malboard, in which a compromised USB keyboard automatically generates and sends malicious keystrokes that mimic the attacked user’s behavioral characteristics, was developed by Ben-Gurion University of the Negev (BG… Continue reading New user keystroke impersonation attack uses AI to evade detection