Sunday , 18 March 2018
Home » Tag Archives: Technology

Tag Archives: Technology

Scarlett Johansson Cryptojacking Scam hits PostgreSQL servers

Researchers from Imperva have discovered a new technique where attackers are disguising malicious code in a photo of Scarlett Johansson and targeting PostgreSQL servers to illegally mine Monero cryptocurrency.   “Hackers have upped their game and are now using what appear to be benign image files, such as the one we found of Scarlett Johansson, to deliver malicious code. In this ... Read More »

RedisWannaMine: Complex New Cryptojacking Attack Discovered

Recently cryptojacking attacks have been spreading like wildfire and Imperva has witnessed that these attacks hold roughly 90% of all remote code execution attacks in web applications. However, this week a new generation of cryptojacking attacks was discovered which is aimed at both database servers and application servers.   Researchers from Imperva discovered the extremely complex cryptojacking attack dubbed RedisWannaMine, which is powered ... Read More »

Security researchers warn of increased Iran cyber threat

Experts are sounding the alarm about new cyber activity from Iran, as hackers become more emboldened and skilled at carrying out surveillance operations and other attacks outside the country’s borders. View Full Story ORIGINAL SOURCE: The Hill Read More »

Malware on macOS makes significant rise in 2017

Mac malware increased by 270% in 2017, compared to 2016, a report by MalwareBytes has revealed, with four new major Mac vulnerabilities uncovered in the first two months of 2018. View Full Story  ORIGINAL SOURCE: IT PRO Read More »

Necurs and Gamut Botnets make up for 97% of the Internet’s Spam Emails

Just two botnets accounted for 97% of all spam emails in the last three months of 2017, according to a McAfee report released earlier today. View Full Story ORIGINAL SOURCE: Bleeping Computer Read More »

Data privacy still being ignored by organisations

It has been found that many organisations are not doing all they can to protect data privacy with there being a lack of transparency in how businesses store personal data, according to PwC’s 2018 Global State of Information Security Survey (GSISS). It was found only 51% of respondents have an accurate inventory of where personal data for employees and customers ... Read More »

Global SOC maturity improves, yet some still operate with serious gaps in security

Despite the volume of threats rising, the global findings of a new Micro Focus report indicate that more mature Security Operational Centres (SOCs) are becoming more efficient in detection with greater ability to recover from breaches than ever before. View Full Story  ORIGINAL SOURCE: Helpnetsecurity Read More »

Spiceworks Study Reveals Nearly 90 Percent of Businesses Will Use Biometric Authentication Technology by 2020

 Spiceworks today announced the results of a new survey examining the adoption and security of biometric authentication technology in the workplace. The results show 62 percent of organisations currently use biometric authentication technology, and an additional 24 percent plan to utilise it within the next two years. The findings indicate that although most IT professionals believe biometric authentication is more secure ... Read More »

CISO Chat – Christian Vezina, Chief Information Security Officer at VASCO Data Security

Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. ... Read More »

Cryptomining Rules Endpoints Around Me

Rick McElroy, Security Strategist,
Carbon Black

The Saga Continues for the ownership of endpoints. Organisations purchase them, manage them, update, support, and protect them. However, the bad actors “own” them all the time. In the last half of 2017, cryptojacking became popularised. This led to a predictable shift from cyber criminals not only cryptojacking, but also installing malware with the sole purpose of using an endpoint ... Read More »