article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2015-5122.

Malware 75
article thumbnail

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Seven hours of high level networking. Why you need to attend RSA Conference 2015. As the 2015 theme suggests, info security is an ever-changing industry. RSA Conference 2015 delivers an engaging experience that will inspire and empower you. The Essential Guide to Cloud Security at RSA 2015 (ciphercloud.com).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2015 Cyberthreat Defense Report Reveals Cyberattacks Rising and Confidence Sinking

CTOvision

In 2014, 71 percent of respondents’ networks were breached with 22 percent of them victimized six or more times. This is a significant increase from the preceding year, which saw 62 percent of respondents’ networks breached, with 16 percent of them victimized by six or more successful cyberattacks. Waking up to a new reality.

Report 117
article thumbnail

There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

CTOvision

Richard Stiennon’s There Will Be Cyberwar: How The Move to Network-Centric War Fighting Has Set The Stage For Cyberwar highlights the disparity of the speed at which technology emerges with the speed at which security for the technology is developed. There have been no attacks, yet, but the malware is in the systems for espionage purposes.

Network 155
article thumbnail

Sandworm APT Deploys New SwiftSlicer Wiper Using Active Directory Group Policy

Tenable

Background On January 27, ESET Research has published a thread on Twitter discussing its analysis of a new wiper malware used in a cyberattack in Ukraine. This new malware, dubbed "SwiftSlicer", was deployed in the target environment using Active Directory (AD) Group Policy. The #SwiftSlicer wiper is written in Go programing language.

article thumbnail

Retrospection & Full PCAP Reveal Instances of XcodeGhost Dating Back to April 2015.

ProtectWise

Last month when news broke of XcodeGhost , the iOS malware that infected apps on the Apple App Store, we retrospected our haystack for evidence of this malware across our customers. Network security tends to focus on detection. The level of effort required to decrypt these communications varies greatly between malware families.

Malware 40
article thumbnail

Follow-Up on Hackers Taking Over Your Car

CTOvision

Chrysler has upgraded its network, to prevent future remote hacking. Mobile Malware and Future Threats (ctovision.com). The recent recall response is due to the Wired magazine article on the two hackers Charlie Miller and Chris Valasek, who were able to wirelessly commandeer a Jeep Cherokee through the Uconnect system.

Sport 104