Current Gustuff Mobile Banking Version Trojan Emerges

Gustuff’s recent Android banking campaigns have included an updated malware version, reports Cisco Talos security researchers. Earlier this year, shortly after the software was described, its operators switched delivery hosts, then moved to remove the C&C network, but continued to control the software via a SMS-based secondary management system. The Gustuff now has a smaller

[ Read More ]

Functionalities of a Content Delivery Network (CDN)

The Internet infrastructure won’t be complete without content delivery networks (CDNs). However, not many users fully understand what they are and what happens behind the scenes. Often, you may hear people brag about using a CDN or give suggestions on using it without really having any in-depth idea about it. A content delivery network, like

[ Read More ]

Giant Ingredion Ingredients Attack Malware

Westchester, Ingredion Incorporated, an Illinois-based ingredient corporation, announced this week that criminal activity has recently been found on certain data center servers. Just a few specifics about the incident have been given, but a piece of malware seems to have compromised some systems of the business. Ingredion says there is no evidence of any compromise

[ Read More ]

Hackers Now Use Their Own Admin Tools Against Company Networks

As if the threatscape couldn’t hold any more danger, IT teams must now add their favorite network administration tools as possible backdoor entry points for hackers. Hackers have found a way to abuse LDAP, Kerberos, and NTLM, take over WMI and DCE/RPC, two popular network admin tools, to get admin privileges. After an initial infection

[ Read More ]

What’s The Number One Stock In The World Of Cybersecurity?

The cybersecurity industry saw impressive growth last year as corporations scrambled to get their houses in order following a series of serious breaches throughout the year. For example, the economic damage of ransomware attacks (which lock computer screens and demand a ransom) grew to an estimated $5 billion in 2017 from just $325 million in

[ Read More ]

Why Cyber Attacks Are Now The Biggest Risk To The World

In the recent World Economic Forum 2018, The Global Risk Report has identified the highest risk on a global level. Experts have determined the possible impact on the geopolitical and economic status of cyber-attacks. It is believed that major attacks may occur in the next five years. Its effect was associated similar to natural disasters

[ Read More ]

Bridging the Gap in Cybersecurity Jobs

Cybersecurity education and the current need in the industry has its big gap. There is a need of integrating targeted and specific education with the risk management plan. It is believed that the field in cybersecurity is understaffed and that there is a need of 1 million jobs globally to be filled. New cybersecurity programs

[ Read More ]

Warning All Corporate Executives, Cybersecurity Is Your Problem!

It’s official—2017 was a record year for massive data breaches. First and foremost, there was the Equifax disaster, which exposed the hyper-private data of millions of customers to cybercriminals. And then there was the Republic National Committee breach, which leaked the personal information of over 200 million American voters. And don’t forget the Uber scandal, which

[ Read More ]

The Importance Of Cybersecurity Teams In Government Agencies

If a government agency’s purpose is to help the government move towards a more modern approach to service delivery, focused on citizens and innovation centered on using the latest and best technology there is—how important is it to have its own cybersecurity team in-house? The Digital Transformation Agency of Australia drives the digital information of

[ Read More ]

Reeling From Cyberattacks, EU Revamps Their Future Plans

Two massive cyber attacks in May and April 2017, the Wannacry virus and the NoPetya attack on Ukraine, tested Europe’s cyber defenses and showed the EU sorely needs to upgrade its threat response. Both viruses exposed various loopholes in security protocols and the lack of countermeasures against the malicious applications. The WannaCry ransomware virus infected

[ Read More ]