| Security Research News |
| Showing 'Security Research News' from 41 to 50|
| |ESET Releases New Decryptor For Syrian Victims Of GandCrab Ransomware ESET experts have created a new decryption tool that can be used by Syrian victims of the GandCrab ransomware. It is based on a set of keys recently released by the malware operators
The post ESET releases new decryptor for Syrian victims...
| |CISO Series: Partnering With The C-Suite On Cybersecurity In my last blog, we looked at five communication techniques that can help engage business managers in the work of cybersecurity. This week, well look at how to use those techniques to bring the C-Suite into the conversation.
The post CISO...
| |Banking Trojans Continue To Surface On Google Play The malicious apps have all been removed from the official Android store but not before the apps were installed by almost 30,000 users
The post Banking Trojans continue to surface on Google Play appeared first on WeLiveSecurity
| |Malware Targeting Brazil Uses Legitimate Windows Components WMI And CertUtil As Part Of Its Routine We recently found a malware that abuses two legitimate Windows files — the command line utility wmic.exe and certutil.exe, a program that manages certificates for Windows — to download its payload onto the victim’s device. What’s...
| |LuminosityLink RAT Author Sentenced To 2.5 Years In Jail As part of his plea agreement, the author of the malware also forfeited the proceeds from his crimes – 114 Bitcoin worth $725,000
The post LuminosityLink RAT author sentenced to 2.5 years in jail appeared first on WeLiveSecurity
| |Top 10 Security Steps In Microsoft 365 That Political Campaigns Can Take Today With the U.S. midterm elections rapidly approaching, campaigns must be vigilant in protecting against cyberattacks to their online collaboration tools, including email. Microsoft has compiled a list of 10 high-impact, easy-to-implement...
| |TRITON Attribution: Russian Government-Owned Lab Most Likely Built
Custom Intrusion Tools For TRITON Attackers OverviewIn a previous blog post we detailed the TRITONintrusion that impacted industrial control systems (ICS) at acritical infrastructure facility. We now track this activity set asTEMP.Veles. In this blog post we provide additional informationlinking...
| |Who Is Agent Tesla? A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity -- attracting more than 6,300 customers who pay monthly fees...
| |Take Steps To Secure Your Business And Users With Our Security Business Assessment The Microsoft Security Assessment can help you discover where you are vulnerable and provide personalized recommendations to improve your security posture.
The post Take steps to secure your business and users with our security business...
| |Voice Of The Customer: Walmart Embraces The Cloud With Azure Active Directory Learn how Walmart embraced the cloud with Azure Active Directory.
The post Voice of the Customer: Walmart embraces the cloud with Azure Active Directory appeared first on Microsoft Secure.
| « Newer 1 2 3 4 5 6 7 8 9 10 Older » |