
Healthcare industry lacks basic security awareness among staff
SecurityScorecard released a comprehensive analysis exposing cybersecurity vulnerabilities across 700 healthcare organizations including medical treatment facilities, health …

Understanding IoT botnets
If you were online on Friday October 21st, you were probably affected by the DDoS attack against managed DNS provider Dyn. Dyn observed that tens of millions of IP addresses …

Dyn DDoS attack post-mortem: Users inadvertently helped
As StarHub, one of the three major telcos in Singapore, confirmed that they were the latest victim of “intentional and likely malicious distributed denial-of-service …

Cybercrime not slowing down anytime soon
In Q3 2016, cybercriminals were increasingly more ingenious, using innovative technologies and new tools to spread their wares. This is confirmed by the 18 million new malware …

Ghost Push Trojan still a major threat to most Android users
The Ghost Push Trojan (also known as Shedun) is still a considerable threat to Android users around the world. The malware is focused on displaying ads, promoting webpages and …

Android banking Trojan asks victims to send selfies with ID cards
The Acecard Android Trojan is a threat that has been around for quite some time. Its main goal is to collect login credentials used by the victims to access their online …

13 countries join global ransomware fight
Just three months after the successful launch of the No More Ransom project, law enforcement agencies from a further 13 countries have signed up to fight ransomware together …

Mirai malware is infecting Sierra Wireless cellular network equipment
AirLink cellular gateway devices by Sierra Wireless are being infected by the infamous Mirai malware. Sierra Airlink models LS300, GX400, GX/ES440, GX/ES450, and RV50 are …

How to implement an EFSS ransomware recovery plan
Ransomware attacks are at an all-time high, and security experts warn it has become a matter of “when” not “if” your company will be breached. The number of victims has grown …

6000+ compromised online shops – and counting
A week ago, RiskIQ researchers revealed that over 100 online shops have, at one point in the last six months, been injected with malicious JavaScript code that exfiltrates …

WSF attachments are the latest malware delivery vehicle
Most users have by now learned not to open executable (.EXE), various MS Office, RTF and PDF files delivered via unsolicited emails, but malware peddlers are always trying out …

Most businesses don’t inspect cloud services for malware
The growing use of cloud services and the lack of visibility into sensitive information in the cloud can result in more damaging or costly data breaches, according to the …