You are here

Cybersecurity

Threat Awareness – Phishing Attack Highlights Shift in Infostealer Capabilities

A recent phishing attack has been observed using a new type of information stealing malware designed to exfiltrate a wide range of sensitive information. Once initiated, the malware targets not only traditional data types like saved passwords, but also session cookies, credit card information, Bitcoin-related extensions, and browsing history. It is engineered to collect comprehensive browser information and files, and then email the stolen data to various email domains owned by the attacker.

Cyber Resilience – Don’t Get Hooked, Phishing Can Still Bypass MFA

Develop a viable defense and threat actors will inevitably find a way to bypass it. That’s the endless game of cat-and-mouse, especially in the cybersecurity world. A historical example was the old advice to ‘never open an email from someone you don’t know,’ so threat actors now expertly purport to be or impersonate someone (or something, as in the case of a well-known brand) we do know. A more recent example concerns multifactor authentication (MFA).

Cyber Resilience – Don't be Soft about Hardware Security

A recent post at The Hacker News discusses the importance of proactive security measures to prevent attacks. Specifically, the post suggests that relying solely on software protections can often be inadequate for safeguarding valuable assets. Software protections are also challenging because software is inherently complicated allowing vulnerabilities to abound even in the very applications meant for security. This challenge serves as a reminder of the importance of applying a complimentary approach based on hardware security.

Cyber Resilience – VPN Exploitation, Don’t Blindly Trust Your VPN

From ransomware groups to state-sponsored actors, multiple cyber threat actor types are exploiting vulnerabilities on edge devices and remote services. Edge devices should be considered among the critical assets of any organization and the security of such devices should be one of the highest priorities. This includes VPNs, as a compromised VPN server could allow attackers to easily gain control over other critical assets in the network.

Pages

Subscribe to Cybersecurity