by Janos Gergo SZELES, from Bitdefender Labs , on 12.01.2021
In the late summer of 2020, the Bitdefender Active Threat Control team noticed a surge of Remcos malware, with most of the attacks taking place in Colombia. While the malware family has been known for quite a while to cyber-criminals and malware researchers alike, this new campaign captured our attention as it arrived on the […] read more
by Bitdefender Team, from Bitdefender Labs , on 11.01.2021
We’re happy to announce the availability of a decryptor for Darkside. This family of ransomware has emerged in August 2020 and operates operate under a ransomware-as-a-service business model. How to use this tool Step 1: Download the decryption tool below and save it on your computer. Step 2: Double-click the file (previously saved as BDDarkSideDecryptor.exe) and […] read more
by Silviu STAHIE, from IoT Security Insights , on 06.01.2021
A security researcher has identified a new malware sample that uses an interesting technique to determine the potential victim's location, without using the various GeoIP API services. Some hackers don't want to draw attention to their activities in the countries they operate from, and they usually give their attacks features that let them determine the ...
The post New Malware Uses WiFi BSSID to Determine the Victim's Location appeared first on Bitdefender.
by Filip Truta, from Business Insights , on 06.01.2021
Remote workers have become lucrative ground for lurking cybercriminals
Scams purporting to sell COVID-19 vaccines are cropping up with allusions to shortages
IT reps, meanwhile, are overburdened and under-resourced leaving gaps for malicious actors to exploit
The ransomware landscape is almost entirely dominated by professionals, leaving one-offs scrambling for affiliation
Cyber actors are showing interest in critical industry verticals, like healthcare, education and municipal infrastructures read more
by Filip Truta, from Business Insights , on 05.01.2021
80% of digital leaders plan to address ‘cyber breach’ risk in 2021 audit plans
IT leaders in North America, Africa, Asia, Europe, the Middle East and Oceania all ranked ‘cyber breaches’ as their top concern
Digitally mature organizations stand out in their frequency of performing technology audit risk assessments
67% of organizations do not classify themselves as digital leaders
‘Cyber breaches’ are consistently a primary concern across key industry sectors read more
by Silviu STAHIE, from IoT Security Insights , on 04.01.2021
The FBI warns that swatters have upped their game and are now hijacking smart devices in victims' homes to live-stream the law enforcement intervention or record the swatting attacks. In swatting, someone calls emergency services and shares false information about the presence of violent criminals or weapons at the victims' location. The intention is to ...
The post FBI Says Swatters Now Hack into Smart Devices to Live-Stream SWAT Intervention appeared first on Bitdefender.
by Business Insights , on 04.01.2021
Cyber criminals are changing their tactics to take advantage of emerging vulnerabilities, according to a new report.
Five key factors are influencing the cyber threat landscape.
By taking certain steps, organizations can build a more security and agile environment. read more
by Business Insights , on 03.01.2021
Not enough organizations are continuously looking for risks in their IT assets.
Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface.
Enterprises need to put monitoring regimes in place that can keep pace with technological change. read more
by Silviu STAHIE, from IoT Security Insights , on 31.12.2020
The Cybersecurity Infrastructure and Security Agency (CISA) is warning of yet another TCP/IP stack vulnerability problem that could lead to remote code execution and denial-of-service attacks. The TCP/IP stack is not a visible layer, and it’s usually comprised of various protocols responsible for all Internet traffic. But, like many other components, it’s not a uniform ...
The post CISA Warns of Multiple Trek TCP/IP Stack Vulnerabilities appeared first on Bitdefender.
by Silviu STAHIE, from IoT Security Insights , on 30.12.2020
Security researchers from the University of Cambridge discovered that attackers could use smart assistants such as Alexa or Google Home to spy on people in their vicinity by listening for typing sounds on virtual keyboards and recovering PINs and passwords. Using microphones to listen to what people type on their keyboards is nothing new. They ...
The post Researchers Use Microphones to Guess PINs and Passwords Typed on Virtual Keyboards appeared first on Bitdefender.