Advanced threats are now more accessible than ever. On the Dark Web you can buy or rent zero-day attacks, fileless malware, supply chain compromises, and malware that targets device memory processes.
Read MoreMorphisec today announced a new ransomware encryption protection feature for unique and comprehensive ransomware Defense-in-Depth. The new capability protects organizations at the most damaging stage of ransomware attacks: the file encryption “impact” phase.
Read MoreA new ransomware pressure tactic, old DrayTek routers are exploited and more. Welcome to Cyber Security Today. It’s Wednesday, March 8th, 2023. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.
Read MoreThe information stealer known as SYS01 has been used by threat actors since November 2022 to infect systems of critical government infrastructure employees and manufacturing companies, among others.
Read MoreCybersecurity researchers have discovered a new information stealer dubbed SYS01stealer targeting critical government infrastructure employees, manufacturing companies, and other sectors since November 2022.
Read MoreThe threat actor uses the malware to target critical government infrastructure employees, manufacturing companies, and others.
Read MoreA new malware discovered by Morphisec and dubbed 'ProxyShellMiner' exploits the Microsoft Exchange ProxyShell vulnerabilities to deploy cryptocurrency miners throughout a Windows domain to generate profit for the attackers.
Read MoreLawrence Pingree, Gartner Vice President of Emerging Technologies - Security & Risk, offers four reasons why he believes Moving Target Defense is the future of security.
Read MoreA skilled attacker can scan and find unprotected endpoints on an enterprise network in seconds, taking just one hour and 24 minutes to move from the initial point of compromise to other systems. That’s 14 minutes faster than last year, based on Falcon OverWatch’s findings in the CrowdStrike Global Threat Report.
Read MoreAs cyberattacks continue to escalate; companies grow their use of tech services outside of their network perimeters and the government and other organizations work with ever more sensitive personal, corporate, and government data, there is increasing adoption of zero trust data protection.
Read More