It now comes as a variant that uses different payloads and spreads mainly through JAR files. In this camapign, the VBS-based infamous worm Houdini is leveraged to infect computer systems. Adwind, a well-known multifunctional malware program which made news in late 2017 has sprung back. A report by McAfee Labs indicated that the remote access tool (RAT) now relies on another malware ...
Read More »Blog
Most Firms in India Lack Adequate Cyber Security: Report
The ‘EY Global Information Security Survey 2018-19 – India Edition’ suggested that companies should invest in analytical capabilities as they would enhance threat detection and improve awareness in company board rooms. Cyber security operations at most companies in India are inadequate and do not meet the security needs, a report by Ernst & Young said, here on Thursday. The ‘EY ...
Read More »Rush University Medical Center data breach, 45,000 patients affected
About 45,000 Rush University Medical Center patients had their data exposed when a third-party employee mistakenly exposed a file containing the data to an unauthorized individual. The Chicago hospital said the data breach most likely happened in May 2018 when a worker at the hospital system’s billing processing vendors disclosed a file containing the patient information to an unauthorized individual, ...
Read More »Fortinet Introduces FortiInsight for Enhanced Insider Threat Protection
Following the acquisition of ZoneFox Limited at the end of last year, Fortinet is today introducing FortiInsight to help organizations mitigate insider threats. FortiInsight uses machine learning analytics to effectively monitor endpoints, data movements and user activities to detect unusal, malicious behavior and policy violations. When integrated with FortiSIEM—as part of the Fortinet Security Fabric—FortiInsight provides organizations with complete visibility into their data activity, enabling ...
Read More »Students from Carnegie Mellon University Win 2019 Deloitte Foundation Cyber Threat Competition
College students representing 15 universities compete at Deloitte University for a real-world challenge of cyber and business complexity. Four students from Carnegie Mellon University won the 2019 Deloitte Foundation Cyber Threat Competition. Team members Karttik Panda, Veera Nandiraju, Sanika Suwant and Nishith Yadav each received $2,000 in scholarship money. Carnegie Mellon University teams have competed since the competition began five ...
Read More »Experian: More Than a Third of Companies are Unprepared to Respond to a Data Breach
Sixth annual corporate preparedness study also reveals that businesses lack confidence in preventing an attack. Are companies ready for today’s sophisticated cybercriminals and impact of data breaches? Experian’s annual corporate preparedness study, Is Your Company Ready for a Big Data Breach?, reveals that progress has been made, but companies need to do better. Conducted by the Ponemon Institute, the findings reveal ...
Read More »Data leaks, default passwords exposed in visitor management systems
Researchers have uncovered a swathe of vulnerabilities which impact visitor management systems in which automation has replaced human assistants. Automation, artificial intelligence (AI), machine learning (ML), the Internet of Things (IoT), and mobility have begun to permeate every aspect of our daily lives. In the hospitality industry, these technologies have presented an opportunity to improve the security of visitors and ...
Read More »Attackers continue to enhance their performance, apply smart business techniques
During the second half of 2018, attackers bulked up existing tactics, rapidly evolvied new performance enhancements, and applied smart business techniques to vastly accelerate attack growth rate, according to the latest Threat Landscape Report by Netscout. IoT’s countdown to attack Constant targets of DDoS malware, IoT devices come under attack within five minutes of being plugged in and targeted by specific exploits ...
Read More »New Flaws Re-Enable DMA Attacks On Wide Range of Modern Computers
Security researchers have discovered a new class of security vulnerabilities that impacts all major operating systems, including Microsoft Windows, Apple macOS, Linux, and FreeBSD, allowing attackers to bypass protection mechanisms introduced to defend against DMA attacks. Known for years, Direct memory access (DMA)-based attacks let an attacker compromise a targeted computer in a matter of seconds by plugging-in a malicious hot plug ...
Read More »Hackers Favorite CoinHive Cryptocurrency Mining Service Shutting Down
Coinhive, a notorious in-browser cryptocurrency mining service popular among cybercriminals, has announced that it will discontinue its services on March 8, 2019.Regular readers of The Hacker News already know how Coinhive’s service helped cyber criminals earn hundreds of thousands of dollars by using computers of millions of people visiting hacked websites. For a brief recap: In recent years, cybercriminals leveraged every ...
Read More »