- How to choose an endpoint protection suiteby Tim Ferrill on September 28, 2021 at 9:00 am
Studies show that CSO readers are most likely to know that endpoint protection is the modern iteration of the antivirus tools of previous generations. Okay, I made that first part up, but the second part is, of course, true. Antivirus, more appropriately known as antimalware, has matured significantly since the days of dedicated antivirus servers, daily signature updates, and manually managed policies. Endpoint protection covers much more than antimalware. As attack methods and the technology behind them have become more diverse and sophisticated, so too must the security tools tasked with protecting what are often the most vulnerable devices on the corporate network: those your users access daily. Threat vectors for end-user devices include browser-based attacks, phishing attempts, malicious software, or spyware. Because of the diverse array of attack vectors a variety of protection methods must be leveraged to protect endpoint devices from compromise. To read this article in full, please click here
- CISA's Cloud Security Technical Reference Architecture: Where it succeeds and where it falls shortby Chris Hughes on September 28, 2021 at 9:00 am
President Biden’s Executive Order 14028 “Improving the Nation’s Cybersecurity” directed the Cybersecurity and Infrastructure Security Agency (CISA) to create a cloud-security technical reference architecture (RA) in coordination with the Office of Management and Budget (OMB) and the Federal Risk and Authorization Management Program (FedRAMP). The intent of the RA is to provide recommendations for cloud migration and data protection for agencies as the federal government continues its Cloud Smart pursuit. To read this article in full, please click here
- Half of Regulated Firms See Pandemic Spike in Financial Crimeon September 28, 2021 at 8:55 am
A quarter of legal, financial and property companies fell victim in 2020
- FCC: Applications Open Soon for Huawei/ZTE Replacement Fundon September 28, 2021 at 8:32 am
Small carriers can access $1.9bn pot to rip-and-replace telecoms kit
- Crypto Developer Pleads Guilty to North Korean Ploton September 28, 2021 at 8:00 am
US citizen taught officials how to use tech to evade sanctions
- Russia-linked Nobelium APT group uses custom backdoor to target Windows domainsby Pierluigi Paganini on September 28, 2021 at 7:26 am
Microsoft discovered new custom malware, dubbed FoggyWeb, used by the Nobelium cyberespionage group to implant backdoor in Windows domains. Microsoft Threat Intelligence Center (MSTIC) researchers have discovered a new custom malware, dubbed FoggyWeb used by the Nobelium APT group to deploy additional payloads and steal sensitive info from Active Directory Federation Services (AD FS) servers. The post Russia-linked Nobelium APT group uses custom backdoor to target Windows domains appeared first on Security Affairs.
- ERMAC, a new banking Trojan that borrows the code from Cerberus malwareby Pierluigi Paganini on September 28, 2021 at 6:27 am
ERMAC is a new Android banking Trojan that can steal financial data from 378 banking and wallet apps. Researchers from Threatfabric found in July a new Android banking trojan dubbed ERMAC that is almost fully based on the popular banking trojan Cerberus. The source code of Cerberus was released in September 2020 on underground hacking The post ERMAC, a new banking Trojan that borrows the code from Cerberus malware appeared first on Security Affairs.
- New BloodyStealer malware is targeting the gaming sectorby Pierluigi Paganini on September 28, 2021 at 5:20 am
Researchers spotted a new malware, dubbed BloodyStealer, that could allow stealing accounts for multiple gaming platforms. Researchers from Kaspersky have spotted a new malware dubbed BloodyStealer that is being used by threat actors to steal accounts for multiple gaming platforms, including Steam, Epic Games Store, GOG Galaxy, EA Origin, and more. The infostealer is available The post New BloodyStealer malware is targeting the gaming sector appeared first on Security Affairs.
- Computer Scientist Jailed Over Dark Web Conspiracyon September 27, 2021 at 8:16 pm
No bail for former California Department of Technology employee charged with selling illegal items on darknet
- #IMOS21: Global Threat Brief - The Most Dangerous Attack Techniques in 2021on September 27, 2021 at 7:40 pm
A panel of experts investigates the most dangerous techniques and how organizations can defend themselves.