Attackers have been exploiting JBoss application servers to install remote-control web shells as part of a campaign that targets enterprises with network-hopping SamSam (a.k.a. Samas) ransomware, researchers at Cisco Talos warn.
Apple's QuickTime media player and web browser plug-in should be immediately expunged from all Windows systems, security experts warn, in a reminder of the dangers of using outdated software - especially web browser plug-ins.
Russian authorities have reportedly sentenced Dmitry "Paunch" Fedotov, the developer of the notorious Blackhole exploit kit that's been linked to large amounts of fraud, to seven years in prison - an unusually severe sentence for online crime in that nation.
A federal court's recent rejection of a motion filed by health insurer Anthem Inc. in its attempt to fight a class-action lawsuit in the wake of its massive data breach is important because it upholds the privacy rights of breach victims, says attorney Steven Teppler.
Federal regulators have still not developed a plan for curbing billing fraud enabled by the cut-and-paste function in electronic health records, as was recommended in a 2013 watchdog agency report.
Is it ever acceptable for ransomware victims to pay a ransom to obtain the decryption key required to restore access to their data? Due to poor preparation, many organizations continue to face that question.
Backed by its own logo, Badlock refers to a set of critical Samba vulnerabilities in Windows and most Unix/Linux operating systems, which attackers could exploit to launch man-in-the-middle attacks against corporate networks.
Ransomware is on the rise. As businesses brace for attack, we can't help but wonder: what would you do if your company were hit with ransomware? Unfortunately, if you haven't backed up your files, there's nothing much you can do-unless you pay the ransom. Of course, that puts a target on your back for future malware...
Recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-factor authentication, device ID systems, risk engines and behavioral analytic systems. Banking malware such as Citadel, Zeus, Dyre and Bugat, incorporate advanced...
Your people are now the primary exploit target. You need to protect them, the way they work, and identify assets and risks before you are compromised. With an increasing amount of sensitive and confidential information- and an expanding attack surface of devices, cloud apps, and mobile locations- you cannot afford to...
The threat landscape is always shifting, and impostor emails are on the rise. Carefully planned and researched, impostor emails target specific people in your company. Either you become
the target of this attack or you become the unwitting victim.
Learn how Proofpoint Email Protection allows you to quickly see,...
Card fraud, account takeovers, business email compromises and emerging cybersecurity regulations and risks have kept, and continue to keep, plenty of CEOs and CISOs up at night. While it's impossible to focus time, energy and resources on all of today's fraud and cybersecurity risks, wise banking executives have...
It's a boom time for cybercrime and cyber-espionage, aided by at least two factors. First, many organizations' websites and databases sport well-known technical weaknesses, while employees remain all to susceptible to low-cost social-engineering attacks. Second, attackers can pummel these technical and human targets...
Advanced attackers always use advanced malware, right? Zero-day exploits, targeted malware, powerful modular frameworks- these are the stock and trade of your adversary.
So we've tuned our detection and hunting capability to ferret out the indicators left behind by this malware. Advances in memory forensics,...
The 2015 ABA Deposit Account Fraud Survey is the eleventh biennial industry study conducted by the American Bankers Association on the topic of deposit account fraud. For over two decades, this ABA survey series has collected detailed DDA fraud information across traditional and emerging banking channels. With...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.