Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 41 to 50
A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan
14th May 2018 [14 days ago] from FireEye Research
As discussed in previousblogs, exploit kit activity has been on the decline since thelatter half of 2016. However, we do still periodically observesignificant developments in this space, and we have been observinginteresting ongoing activity...
WannaCryptor: The Curious Tale Of A Ravenous Cryptoworm
14th May 2018 [14 days ago] from ESET Research
Do you still remember how WannaCryptor ran its – winding – course? It was a tale that revealed a number of intriguing plot lines amid the ransomworm’s numerous twists and turns. The post WannaCryptor: The curious tale of a ravenous...
Top Exploit Kit Activity Roundup – Spring 2018
12th May 2018 [16 days ago] from Zscaler
Overview This is the eighth in a series of blogs by the Zscaler ThreatLabZ research team collecting and analyzing the recent activity of the top exploit kits. Exploit kits (EKs) are rapidly deployable software packages designed to leverage...
Malicious Traffic In Port 7001 Surges As Cryptominers Target Patched 2017 Oracle WebLogic Vulnerability
11th May 2018 [17 days ago] from TrendMicro
We observed a large spike in the number of devices scanning the internet for port 7001/TCP since April 27, 2018. Our analysis found that its increased activity was caused by cybercriminals engaging in cryptomining via exploiting CVE-2017-10271....
Behind The CARBANAK Backdoor
11th May 2018 [17 days ago] from FireEye Research
In this blog, we will take a closer look at the powerful, versatilebackdoor known as CARBANAK (aka Anunak). Specifically, we willfocus on the operational details of its use over the past few years,including its configuration, the minor...
Are Firms And Regulators Prepared For GDPR?
11th May 2018 [17 days ago] from ESET Research
The answer may hinge on if youre a glass-half-full or glass-half-empty kind of person. While we’re at it, how about regulators’ level of preparedness, anyway? The post Are firms and regulators prepared for GDPR? appeared first on...
12 Months On, What Are The Lessons Learned From WannaCryptor?
11th May 2018 [17 days ago] from ESET Research
Time does fly! It feels like only yesterday that a new strain of hitherto little-known malware achieved celebrity status among global ransomware campaigns The post 12 months on, what are the lessons learned from WannaCryptor? appeared first...
New Phishing Scam Uses AES Encryption And Goes After Apple IDs
10th May 2018 [17 days ago] from TrendMicro
by Jindrich Karasek Recent data breaches and privacy scares, along with the upcoming General Data Protection Regulation (GDPR) from the European Union, have triggered a change in the way companies handle their users’ data. As a result,...
The Final Compliance Countdown: Are You Ready For GDPR?
10th May 2018 [18 days ago] from Microsoft
On May 25, the General Data Protection Regulation (GDPR) will replace the Data Protection Directive as the new standard on data privacy for all organizations that do business with European Union (EU) citizens.[1]When GDPR goes into effect,...
Enhancing Office 365 Advanced Threat Protection With Detonation-based Heuristics And Machine Learning
10th May 2018 [18 days ago] from Microsoft
Email, coupled with reliable social engineering techniques, continues to be one of the primary entry points for credential phishing, targeted attacks, and commodity malware like ransomware and, increasingly in the last few months, cryptocurrency...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »