Cisco Talos this week warned of a massive increase in brute force attacks against VPN services, SSH services and web application authentication interfaces. In its advisory, the company described the…
Category: Cyber Security
Global police operation disrupts ‘LabHost’ phishing service, over 30 arrested worldwide
As many as 37 people have been arrested as part of an international crackdown on a cybercrime service called LabHost which has been used by criminal actors to steal personal…
Auburn’s McCrary Institute and Oak Ridge National Laboratory collaborate on the Regional Center for Cybersecurity
PRESS RELEASE Auburn, Ala. – Auburn University’s McCrary Institute for Cyber and Critical Infrastructure Security has received a $10 million grant from the Department of Energy in partnership with Oak…
New Android Trojan “SoumniBot” evades detection with clever tricks
April 18, 2024PressroomMobile Security/Malware A new Android trojan called SoumniBot was detected in the wild targeting South Korean users by exploiting weaknesses in the manifest extraction and analysis procedure. The…
Countering voice fraud in the age of artificial intelligence
COMMENTThree seconds of audio is enough to clone a voice. Vishing, or voice fraud, has quickly become a problem that many of us know all too well, affecting 15% of…
Cybercrime group FIN7 targeting US auto industry with Carbanak backdoor
April 18, 2024PressroomCyber attack/Malware The infamous cybercrime syndicate known as FIN7 has been linked to a spear-phishing campaign targeting the US auto industry to deliver a known backdoor called Carbanak…
Interrupting safety burnout: Combining leadership and neuroscience
It’s no secret that burnout is an epidemic among cybersecurity professionals that threatens not only the mental health of workers in the field, but also the security of organizations. But…
OfflRouter malware escapes detection in Ukraine for almost a decade
April 18, 2024PressroomIncident response/cyber espionage Some Ukrainian government networks have been infected with malware called OfflRouter since 2015. Cisco Talos said its findings are based on the analysis of more…
Because “recovery” cannot stand alone
COMMENT As the digital landscape becomes increasingly treacherous, companies are finally starting to view cybersecurity as a major operational risk. And for companies that are reviewing their data security strategies,…
How to conduct advanced static analysis in an anti-malware sandbox
Sandboxes are synonymous with dynamic malware analysis. They help execute malicious files in a safe virtual environment and observe their behavior. However, they also offer a lot of value in…