A week in security (March 7 – March 13)

The most important and interesting security stories from the last seven days.

Read more

Hackers take over 1.1 million accounts by trying reused passwords

Credential stuffing has once again proven to be an effective method to gain access to accounts. What can users and organizations do?

Read more

Purple Fox rootkit now bundled with Telegram installer

The Purple Fox malware family has been found to combine its payload with trusted apps in an interesting way.

Read more

Perkiler malware turns to SMB brute force to spread

Perkiler is now using SMB brute force attacks to spread. Which is not a new concept, but why attack SMB instead of RDP?

Read more

Cybercriminals want your cloud services accounts, CISA warns

CISA has issued a warning about several recent successful cyberattacks against various organizations’ cloud services

Read more

A week in security (December 14 – December 20)

A roundup of cybersecurity news from December 14 – 20, including SolarWinds, smart toys, Egregor, and many other topics.

Read more

VideoBytes: Brute force attacks increase due to more open RDP ports

The number of RDP ports exposed to the Internet grew from about three million in January 2020 to over four and a half million in March. So how do you protect yourself?

Read more

Brute force attacks increase due to more open RDP ports

More open ports are inviting attackers to try and gain entry by using brute force attacks. Why is this happening and what can we do?

Read more

The passwordless present: Will biometrics replace passwords forever?

The effectiveness of passwords to protect data has long been debated. Many have called for the death of passwords, instead pushing for biometrics to secure their most precious information. But is biometrics really a better, safer option?

Read more

Threat spotlight: Phobos ransomware lives up to its name

Phobos, which many believe was named after the Greek god of fear, isn’t as widespread as it was before nor is it more novel than your average ransomware. Yet, it remains a threat to consumers and businesses alike. We dive into Phobos ransomware and show users how to face their fears and protect against it.

Read more

Select your language