Hunt for IoT Devices: Bots on the rise

The Internet of Things (IoT) and, specifically, the hunt for exploitable IoT devices by attackers, has been a primary area of research for F5 Labs for over a year now—and with good reason. IoT devices are becoming the cyber weapon delivery system of choice by today’s botnet-building attackers. And, why not? There are literally billions [...]

By |Cybersecurity, IOT|Comments Off on Hunt for IoT Devices: Bots on the rise

TeamSpy a 10 year long cyber-espionage operation has resurfaced

The malware, designed to provide its operators with full access to the compromised machines, was used in an information gathering operation that focused mainly on ordinary people, though some victims were found to be high profile industrial, research, or diplomatic targets. The malware was abusing the legitimate TeamViewer remote access tool for its nefarious operations, [...]

By |Ransomware, Uncategorized|Comments Off on TeamSpy a 10 year long cyber-espionage operation has resurfaced

The psychology of a ransomware attack: A guide to what makes victims click

Cybercrime is very much a psychological game and ransomware is no exception. Psychology plays a major role in almost all aspects of ransomware from the moment an attack is launched to the moment the victim pays, or refuses to pay the ransom. Most ransomware is distributed through phishing emails, instant messages, and text messages. Distributors [...]

By |Cybersecurity|Comments Off on The psychology of a ransomware attack: A guide to what makes victims click

2017: More Apple Security Flaws, Cyberattacks, Hacktivisim

More security vulnerabilities will appear in the software of Adobe and Apple than in Microsoft's, more attacks on the Internet's infrastructure will occur, and cybersecurity events will stoke international tensions. Users of Apple desktops and laptops for years have been relatively insulated from the kinds of malicious activity that has besieged those in the Windows [...]

By |General|Comments Off on 2017: More Apple Security Flaws, Cyberattacks, Hacktivisim

US Pushes Cybersecurity Acquisition Tools as Contracts Flow

Vendors of cybersecurity offerings are finding that the U.S. government is serious about improving the protection of federal IT assets. A steady stream of data protection contracts has been flowing to providers, including some notable high-value transactions during the last half of 2016. One example is a Department of Homeland Security contract, with a potential [...]

By |Healthcare IT|Comments Off on US Pushes Cybersecurity Acquisition Tools as Contracts Flow

Watson Joins Cybersecurity Warriors’ Ranks

IBM announced Watson for Cyber Security, a powerful new ally for organizations that want to protect their data from Net marauders. The new offering bolsters the ability of information security pros to analyze the flood of information from the roughly 200,000 events that pour into their Security Operations Centers, or SOCs, every day. About 20 [...]

By |Ransomware|Comments Off on Watson Joins Cybersecurity Warriors’ Ranks

Doxware – The Next Generation in Ransomware Epidemics

In the latest spin on extortionware, is a malware product called doxware. Doxware has also been around for a while, however it’s the new approach in “spreading the infection” which is causing some concern; with opinions between those who think that new doxware attacks could lead to broader infections and those that do not. Doxware attacks [...]

By |Cloud|Comments Off on Doxware – The Next Generation in Ransomware Epidemics
Go to Top