How AsyncRAT is escaping security defenses
AsyncRat is one of the most popular and open-source remote access trojans. This piece of malware has been used for the last few months by professionals and cybercriminals in their activities. The more decent malicious wave of AsyncRat can escape security defenses by using a specially crafted .bat loader like other trojans, including URSA. Netspoke […]
Goldoson Android Malware Found in 60 Apps with 100M Downloads
By Deeba Ahmed The malware was identified by cybersecurity researchers at McAfee. This is a post from HackRead.com Read the original post: Goldoson Android Malware Found in 60 Apps with 100M Downloads
Preventing Malware & Cyber Attacks: Simple Tips for Your Computer
By Owais Sultan Living without the Internet is hardly imaginable today. However, the anonymity of the internet has led to the… This is a post from HackRead.com Read the original post: Preventing Malware & Cyber Attacks: Simple Tips for Your Computer
Chrome extensions used to steal users’ secrets
We are living in an era where technology is part of our lives. The usage of utilities to make our daily tasks easier and boost their efficiency and accuracy is an essential factor these days. As a result, new extensions emerge daily, a large volume with good intent and others taking advantage of bad purposes […]
Secure by default: recommendations from the CISA’s newest guide, and how Cloudflare follows these principles to keep you secure
When you buy a new house, you shouldn’t have to worry that everyone in the city can unlock your front door with a universal key before you change the lock. You also shouldn’t have to walk around the house with a screwdriver and tighten the window locks and back door so that intruders can’t pry […]
’Tis the Season for eCrime
Financially motivated criminal activities, aka “eCrime,” happen in waves. They come and go as adversaries develop new tools and target vulnerable victims. Similar to how investors track stock market activity using various indexes, CrowdStrike monitors eCrime using multiple observables and codifies the activity in the CrowdStrike eCrime Index (ECX). While most factors that affect the […]
Evicting Typosquatters: How CrowdStrike Protects Against Domain Impersonations
Threat actors constantly unleash phishing attacks that use emails or text messages containing domains or URLs, all designed to impersonate well-known companies and trick users into visiting fake websites and entering their logon or other confidential information. Unfortunately, many users fall prey to such attacks, unknowingly giving threat actors access to their work or personal […]
Guidance on network and data flow diagrams for PCI DSS compliance
This is the third blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when contracting quarterly CDE tests here. PCI DSS requires that an “entity” have up to date […]
Get ready for RSA 2023: Stronger Together
Going to RSA next week? If you don’t know, it’s a huge cybersecurity conference held at Moscone Center in San Francisco, CA. If you’re going, please stop by the AT&T Cybersecurity booth and check us out. It’s at #6245 in the North Hall. Remember to bring a picture ID for RSA check-in, otherwise you’ll have […]
ChatGPT’s Data Protection Blind Spots and How Security Teams Can Solve Them – post by LinkCyb
Apr 20, 2023The Hacker NewsArtificial Intelligence / Data Safety In the short time since their inception, ChatGPT and other generative AI platforms have rightfully gained the reputation of ultimate productivity boosters. However, the very same technology that enables rapid production of high-quality text on demand, can at the same time expose sensitive corporate data. A […]