Some interesting articles from around
Dropping Anchor: From a TrickBot Infection to the Discovery of the Anchor Malware
Cybereason Nocturnus detected a series of targeted attacks against high-profile targets that uses a new variant of Anchor_DNS and a new malware dubbed Anchor.
LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack
Cybereason detected an evasive infection technique used to spread a variant of the Ramnit banking Trojan as part of an Italian spam campaign. We investigate […]
Attackers turn to masquerading icons to boost phishing attack’s success
Cybereason has observed thousands of malicious file executions masquerading as a popular programs such as Adobe PDF Reader, MS Word and Chrome.
What to Expect from the Biggest Threat Actors During the Winter Olympics
Over the last decade, cyberattacks during the Olympic Games have increased. Here's what to expect from major threat actors during next month's Winter Games.
Attackers use tax season to spread malware, launch phishing attacks
Uncle Sam isn't the only one looking for your money during tax season. Fraudsters are using the build up to the April 18 tax filing deadline to spread malware […]
What Is Multifactor Authentication?
on January 21, 2020
An update to ALTA’s Title Insurance and Settlement Company Best Practices that went into effect […]
HTTPS vs. HTTP
on December 17, 2019
Many companies still use what's commonly known as HTTP (Hypertext Transfer Protocol) to communicate […]
The Business Value of ‘Thank You’
on December 12, 2019
By Cindy McGovern Remember the last time a client, a boss or a co-worker gave you a handwritten […]
Business Continuity: Have a Plan
on December 5, 2019
Earlier this year, while Americans across the country were still celebrating July 4th, Jaime […]
Get Your Free ALTA Registry Listing
on November 21, 2019
In 1878, New Haven, Conn., became home to what is considered the world’s first telephone […]
Friday Five: 1/24 Edition
on January 24, 2020
Job performance details of over 900 employees left exposed online, a new ransomware family targets Windows 10 users, and more - catch up on the week's news […]
CISA Warns of Uptick in Emotet Malware
on January 23, 2020
CISA is spreading new guidance to ensure admins can properly defend against Emotet malware attacks, which the agency claims are on the rise.
NIST Issues Version 1.0 of Privacy Framework
on January 22, 2020
NIST released its inaugural Privacy Framework last week. The document can be used by organizations as a risk management tool, to answer questions about its […]
Post-GDPR, 160,000 Data Breaches and Counting
on January 21, 2020
A new report that aggregates post-GDPR data breach statistics in Europe suggests new, higher fines are to come in 2020.
New Bill Would Aid CCPA Compliance for HIPAA Business Associates
on January 20, 2020
A new bill in California would amend the CCPA and further health data exemptions - namely data that's been de-identified in the eyes of HIPAA.
How Adversaries Use Politics for Compromise
on November 5, 2019
Cisco Talos recently discovered several malware distribution campaigns where the adversaries were […]
C2 With It All: From Ransomware To Carding
on November 4, 2019
Cisco Talos recently discovered a new server hosting a large stockpile of malicious files. […]
Threat Roundup for October 25 to November 1
on November 1, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 25 […]
The commoditization of mobile espionage software
on October 30, 2019
Mobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps […]
Threat Roundup for October 18 to October 25
on October 25, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 18 […]
Why You Should Take Social Media Account Takeover as Seriously as a BEC Attack
Much like a threat actor can pose as an executive in BEC attacks, they can take over a social media account and abuse the inherent trust we have with it.
SIM Swap Attacks are making SMS Two-Factor Authentication Obsolete
SMS-based two-factor authentification is accessible and improves security, but unfortunately, social engineering can allow threat actors to skip through […]
New Webinar: Inside the World of Social Media Phishing: Financial Scams
Attend our upcoming webinar to learn about the latest techniques threat actors use to abuse social media for phishing attacks.
Threat Actor Abuses Mobile Sensor to Evade Detection
A unique mobile obfuscation technique discovered to help threat actors keep their attacks alive longer.
New White Paper: BEC Attacks are the Most Costly Form of Phishing
Download our latest white paper to understand BEC attacks are the most costly form of phishing.
We’re stepping up to North Dakota. Here’s why.
on December 18, 2019
Back in August 2019, the legislators of North Dakota felt it was within their power to violate your […]
Is your partner cheating? Here’s a surefire way to catch a cheating spouse
on August 6, 2018
Need to find out if your partner is cheating on you? Heartbreak. Betrayal. Anger. Insecurity. […]
Anonymous Texting: How to Easily Send Fake Text Messages
on April 2, 2018
Need to send an anonymous text? Here’s everything you need to know. In this technological […]
Want to Place Free Prank Calls? Here’s How.
on April 1, 2018
Here’s how you get started prank calling people for FREE. Prank calls can be really, really […]
How to Hide Caller ID: Your Guide to Staying Anonymous on the Phone
on March 28, 2018
Do you know how to hide caller ID? We’ll let you in on a few secrets. Your caller ID. […]