Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 41 to 50
ESET Releases New Decryptor For Syrian Victims Of GandCrab Ransomware
25th Oct 2018 [20 days ago] from ESET Research
ESET experts have created a new decryption tool that can be used by Syrian victims of the GandCrab ransomware. It is based on a set of keys recently released by the malware operators The post ESET releases new decryptor for Syrian victims...
CISO Series: Partnering With The C-Suite On Cybersecurity
24th Oct 2018 [20 days ago] from Microsoft
In my last blog, we looked at five communication techniques that can help engage business managers in the work of cybersecurity. This week, well look at how to use those techniques to bring the C-Suite into the conversation. The post CISO...
Banking Trojans Continue To Surface On Google Play
24th Oct 2018 [20 days ago] from ESET Research
The malicious apps have all been removed from the official Android store but not before the apps were installed by almost 30,000 users The post Banking Trojans continue to surface on Google Play appeared first on WeLiveSecurity
Malware Targeting Brazil Uses Legitimate Windows Components WMI And CertUtil As Part Of Its Routine
24th Oct 2018 [20 days ago] from TrendMicro
We recently found a malware that abuses two legitimate Windows files — the command line utility wmic.exe  and certutil.exe, a program that manages certificates for Windows — to download its payload onto the victim’s device. What’s...
LuminosityLink RAT Author Sentenced To 2.5 Years In Jail
24th Oct 2018 [21 days ago] from ESET Research
As part of his plea agreement, the author of the malware also forfeited the proceeds from his crimes – 114 Bitcoin worth $725,000 The post LuminosityLink RAT author sentenced to 2.5 years in jail appeared first on WeLiveSecurity
Top 10 Security Steps In Microsoft 365 That Political Campaigns Can Take Today
23rd Oct 2018 [21 days ago] from Microsoft
With the U.S. midterm elections rapidly approaching, campaigns must be vigilant in protecting against cyberattacks to their online collaboration tools, including email. Microsoft has compiled a list of 10 high-impact, easy-to-implement...
TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools For TRITON Attackers
22nd Oct 2018 [22 days ago] from FireEye Research
OverviewIn a previous blog post we detailed the TRITONintrusion that impacted industrial control systems (ICS) at acritical infrastructure facility. We now track this activity set asTEMP.Veles. In this blog post we provide additional informationlinking...
Who Is Agent Tesla?
22nd Oct 2018 [22 days ago] from Krebsonsecurity
A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity -- attracting more than 6,300 customers who pay monthly fees...
Take Steps To Secure Your Business And Users With Our Security Business Assessment
22nd Oct 2018 [22 days ago] from Microsoft
The Microsoft Security Assessment can help you discover where you are vulnerable and provide personalized recommendations to improve your security posture. The post Take steps to secure your business and users with our security business...
Voice Of The Customer: Walmart Embraces The Cloud With Azure Active Directory
22nd Oct 2018 [22 days ago] from Microsoft
Learn how Walmart embraced the cloud with Azure Active Directory. The post Voice of the Customer: Walmart embraces the cloud with Azure Active Directory appeared first on Microsoft Secure.
« Newer 1 2 3 4 5 6 7 8 9 10 Older »