БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 5

Nov 16, 2024

Identity Security Is The Cornerstone Of Modern Cyber Defense

Posted by in categories: cybercrime/malcode, innovation

The Semperis Hybrid Identity Protection conference kicked off today in New Orleans, gathering identity security experts, practitioners, and thought leaders to explore the evolving world of hybrid identity. This year’s conference, more relevant than ever, highlights a fundamental shift in how organizations approach identity—not just as a tool for managing user access but as a critical layer of cybersecurity that shapes an organization’s defensive posture. In an era of remote work, cloud adoption, and advanced cyber threats, identity has become the new perimeter, making events like HIP essential for fostering innovation, resilience, and collective knowledge in the industry.

Historically, identity management was an IT utility—a straightforward way to grant employees access to necessary resources. However, as digital transformations swept through organizations, the role of identity shifted dramatically. Identity is now central to security strategies, especially with the explosion of SaaS applications, remote access, and mobile workforces. For many organizations, identity is not just about provisioning accounts; it’s the first and last line of defense against unauthorized access and data breaches.

This transition has led to a realignment within organizations, where identity management is increasingly overseen by CISOs rather than traditional IT teams. CISOs recognize that identity management is a security function with direct implications on risk mitigation, compliance, and resilience.

Nov 15, 2024

AI can be leveraged to improve cybersecurity and health equity

Posted by in categories: biotech/medical, cybercrime/malcode, health, robotics/AI

AI be leveraged to improve cybersecurity and health equity #PopHealthIT


For Global Health Equity Week, HIMSS senior principal of cybersecurity and privacy Lee Kim describes some of the ways how privacy and security intersect with health access and patient engagement – and how artificial intelligence can help.

Nov 14, 2024

You Can Lock Your Social Security Number After a Data Breach. Here’s How

Posted by in categories: cybercrime/malcode, employment

Your Social Security number is essential for finding employment, filing taxes and applying for credit. It can also be a nightmare to recover if thieves get a hold of your SSN and use it to apply for jobs, open accounts in your name and steal your tax refund.

Blocking electronic access to your SSN may feel extreme — it’s certainly inconvenient. But if you’ve been a victim of identity theft or your personal identifiable information was compromised in a recent data breach, like the hacks of Change Healthcare or National Public Data, where hundreds of millions of people were impacted, locking your SSN may protect you from future harm.

Blocking access or “locking” your SSN will make it extremely difficult for an identity thief to use your SSN for malicious actions. This, coupled with a credit freeze, can help stop identity thieves in their tracks.

Nov 14, 2024

Hackers use macOS extended file attributes to hide malicious code

Posted by in category: cybercrime/malcode

Hackers are using a novel technique that abuses extended attributes for macOS files to deliver a new trojan that researchers call RustyAttr.

The threat actor is hiding malicious code in custom file metadata and also uses decoy PDF documents to help evade detection.

The new technique is similar to how the Bundlore adware in 2020 hid its payloads in resource forks to hide payloads for macOS. It was discovered in a few malware samples in the wild by researchers at cybersecurity company Group-IB.

Nov 12, 2024

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

Posted by in category: cybercrime/malcode

Ymir ransomware exploits memory management to evade detection, targeting credentials for stealthy network breaches.

Nov 11, 2024

Windows machines are being targeted with ZIP file workaround

Posted by in category: cybercrime/malcode

There is a way to merge multiple ZIP files into one and thus hide malware.

Nov 11, 2024

AI-based authentication scheme can safeguard vehicles from cyber threats

Posted by in categories: cybercrime/malcode, internet, robotics/AI

Scientists have developed an AI-based authentication scheme to enhance vehicle security in the Internet of Vehicles (IoV).


Scientists claim to have developed an artificial intelligence tool to consolidate the privacy of vehicles and their drivers.

How to preserve the privacy of the so-called Internet of Vehicles (IoV) has emerged as a major challenge due to geographical mobility of vehicles and insufficient resources, the scientists say.

Continue reading “AI-based authentication scheme can safeguard vehicles from cyber threats” »

Nov 11, 2024

Quantum Computing Threatens Cybersecurity: Are We Prepared?

Posted by in categories: cybercrime/malcode, quantum physics, supercomputing

As quantum computing grows, researchers are urgently preparing for its impact on cybersecurity by developing quantum-resistant cryptographic protocols.

This research, led by experts at the National Center for Supercomputing Applications, focuses on safeguarding supercomputing infrastructures against quantum threats.

Quantum Computing and Cybersecurity.

Nov 11, 2024

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

Posted by in categories: cybercrime/malcode, internet

The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware.

“This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures,” CloudSEK said in a new report.

AndroxGh0st is the name given to a Python-based cloud attack tool that’s known for its targeting of Laravel applications with the goal of sensitive data pertaining to services like Amazon Web Services (AWS), SendGrid, and Twilio.

Nov 11, 2024

Hackers now use ZIP file concatenation to evade detection

Posted by in category: cybercrime/malcode

Hackers are targeting Windows machines using the ZIP file concatenation technique to deliver malicious payloads in compressed archives without security solutions detecting them.

The technique exploits the different methods ZIP parsers and archive managers handle concatenated ZIP files.

This new trend was spotted by Perception Point, who discovered a a concatentated ZIP archive hiding a trojan while analyzing a phishing attack that lured users with a fake shipping notice.

Page 5 of 223First23456789Last