Lock and Code S1Ep2: On the challenges of managed service providers

On episode 2 of Lock and Code, we discuss the latest security news, including how to secure remote workers, security conferences cancelled because of coronavirus, and Google Play’s poor performance on stopping malware. Plus, we speak to two MSP representatives on the daily challenges of managing thousands of endpoints.

Read more

APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT

We look at a spear phishing attack from APT36, an Advanced Persistent Threat group posing as the government of India and offering guidance on coronavirus. Instead, users are infected with a Crimson RAT that steals data.

Read more

Spear phishing 101: what you need to know

We look at the threat of spear phishing, why it’s such a problem, and what organizations can do to lessen the chance of a successful attack.

Read more

Europol: Ransomware remains top threat in IOCTA report

The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report. We highlight their key findings and remind readers how to better protect themselves.

Read more

Emotet malspam campaign uses Snowden’s new book as lure

Emotet starts a new week of malicious spam by promising a copy of Edward Snowden’s new book.

Read more

Emotet is back: botnet springs back to life with new spam campaign

After months of laying dormant, the notorious Emotet is back, with its botnet spewing spam globally.

Read more

A week in security (September 2 – 8)

A roundup of the latest cybersecurity news for the week of September 2 – 8, including TrickBot’s new trick, a social engineering toolkit, and how to keep remote workers safe.

Read more

Everything you need to know about ATM attacks and fraud: part 2

In part two of this two-part series on ATM attacks and fraud, we outline the final two ATM attack types—logical and social engineering—and provide info on how they are conducted, the different malware families used in these attacks, and how to protect against them.

Read more

No man’s land: How a Magecart group is running a web skimming operation from a war zone

We take a look into a Magecart group’s web skimming activities, which are relying on a bulletproof-friendly host in battle-scarred Luhansk, Ukraine to provide cover for their activities, safe from the reach of law enforcement and the security community.

Read more

Leaks and breaches: a roundup

There’s been some huge leaks and breaches over the last few days, impacting everything from regular logins to important financial documents. What’s the fallout?

Read more

Select your language