Remove 2015 Remove Blog Remove Malware Remove Security
article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2015-5122.

Malware 74
article thumbnail

Game Change: Three Reasons Why #SonyHack Will Change Security

CTOvision

Anup Ghosh, CEO of Invincea published well reasoned context on the Sony Hack at the Invincea blog, it is reposted below for your consideration. The White House declares it’s a national security issue and leaks intelligence that North Korea is behind the attack. See the interview here: Tactics Not Malware Are the Story.

Security 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

COVID-19: Coronavirus Fears Seized by Cybercriminals

Tenable

Malware and phishing campaigns use global interest in the novel coronavirus to capitalize on fear and uncertainty around the pandemic. Coronavirus-themed malware campaigns. IBM’s X-Force team compiled some indicators of compromise on January 29 and published a summary blog post on February 5. Image source: Proofpoint blog.

Malware 111
article thumbnail

How Can CIOs Teach Their Employees About Cybersecurity?

The Accidental Successful CIO

CIOs know that training employees is the key to keeping their network secure Image Credit: Merrill College of Journalism Press Releases. I think that we can all agree that keeping the company’s network secure is one of the person with the CIO position’s most important tasks because of the importance of information technology.

article thumbnail

Cybercrime in Hollywood: Why hacking is portrayed more accurately than you think

Lacework

After working in the security world, it made me wonder, could hackers really take control of a moving car? To find out more, I turned to some of my favorite cybersecurity experts—two of Lacework Labs’ cloud security researchers Chris Hall and Greg Foss, who both consistently stay ahead of hackers and their techniques.

.Net 78
article thumbnail

Retrospection & Full PCAP Reveal Instances of XcodeGhost Dating Back to April 2015.

ProtectWise

Last month when news broke of XcodeGhost , the iOS malware that infected apps on the Apple App Store, we retrospected our haystack for evidence of this malware across our customers. Network security tends to focus on detection. Once a threat is discovered, the work has just begun for security teams and incident responders.

Malware 40
article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

Artificial intelligence (AI) for security isn’t autonomous – yet. The following is a true story from a pilot Cortex XDR Managed Threat Hunting customer, and it showcases the security outcomes that can be achieved today when you pair powerful AI with elite threat hunting expertise.