Endless Zero-Days?

The number of vulnerabilities available to cybercriminals continues to accelerate. But according to one recent report, of the over 100,000 vulnerabilities published to the CVE list, less than 6 percent were actually exploited in the wild. The challenge is that predicting which vulnerability will be targeted next, and which exploit will Continue Reading

How Can SMB Practices Improve Healthcare Cybersecurity?

The healthcare sector has been under increasing attack from cybercriminals with a variety of tactics and motivations. In fact, cyberattacks targeting healthcare providers increased 63 percent in 2016. The increased attention cybercriminals are giving the healthcare space is not surprising. The protected health information and other personally identifiable information (PII) Continue Reading

Living Securely in a Digital World

Over the past several months the news has been full of reports about cybercriminals using malware to shut down devices or networks, steal data, or hold it for ransom. During the second quarter of 2017, over 184 billion total exploits were documented, coming from nearly 6,300 unique exploits. This is an Continue Reading

Why the Financial Sector Needs to Focus on Automating Threat Intelligence

Cybercriminals have challenged security professionals across industries to create updated and sophisticated security protocols to match the volume of equally sophisticated malware attack vectors being directed at them. This is especially true for cybersecurity at financial institutions. A recent study has found that the financial services sector is attacked 65 Continue Reading

Automating Defenses Against Assembly-Line Attacks

Cybercriminals and rogue governments are using automation to deploy malware with speed and scale. A manual approach to defense isn’t enough, which is why we must understand how we got into this situation. Infrastructure Trends: Cloud, Encryption, and Crimeware-as-a-Service Cloud adoption infrastructure trend has far-reaching implications for cybersecurity. Fortinet’s recent Threat Continue Reading

Byline: Petya, Wannacry, and Mirai – Is This the New Normal?

This past year, cybercriminals have upped the stakes once again with the high profile, global attacks of Mirai, Wannacry, and Petya, launched one after the other. Of course, large-scale attacks aren’t new. Attacks like the ILOVEYOU worm and Code Red and Nimda were massive attacks, some of which affected exponentially Continue Reading

Byline: Healthcare in the Crosshairs

Healthcare systems are consistently a preferred target of cybercriminals. Today, whenever a cyberattack occurs, healthcare networks seem to be right in the crosshairs. There are reasons for this. Historically, healthcare networks have been reasonablely easy to break into. Despite the implementation of new EHR systems and critical infrastructure for healthcare Continue Reading

Why Healthcare Security Breaches Are Big Wins for Cybercriminals

The healthcare industry is under attack for a reason. Cybercriminals view it as a place that’s ripe for “big wins,” and the number of large healthcare institutions recently falling victim to data breaches shows they’re having success. But, what exactly makes healthcare such a popular target among today’s cyber criminal Continue Reading

TheMoon – A P2P botnet targeting Home Routers

In the post “Home Routers – New Favorite of Cybercriminals in 2016”, we discussed the active detection of vulnerability CVE-2014-9583 in ASUS routers since June of this year.  In this post we will dissect a bot installed on the affected ASUS routers. The following figure shows attack traffic captured through Continue Reading

Pokémon Go Accounts Targeted by Bogus Pokémon Go Bot

Pokémon Go’s rapid rise in popularity has attracted cybercriminals to leverage its hype for their malicious intents. So far, we have seen backdoored Pokémon Go apps, lockscreen apps, scareware apps, SMS spam, as well as Windows ransomware. This time we have seen a new attack that takes aim at Pokémon Go Continue Reading

>