Quarterly Report: Incident Response trends in Q1 2022

Ransomware continues as the top threat, while a novel increase in APT activity emerges By Caitlin Huey. Ransomware was still the top threat Cisco Talos Incident Response (CTIR) saw in…

Firms Push for CVE-Like Cloud Bug System

Researchers propose fresh approaches to cloud-security bugs and mitigating exposure, impact and risk. Big gaps exist in the 22-year-old Common Vulnerability and Exposures (CVE) system that do not address dangerous…

The Emotet botnet is back, and it has some new tricks to spread malware

A prolific botnet has reemerged with new techniques to infect Windows PC with malware.  Once described as the most dangerous malware botnet in existence, Emotet helped cyber criminals to distribute…

Group behind Emotet botnet malware testing new methods to get around Microsoft security

Written by AJ Vicens Apr 26, 2022 | CYBERSCOOP The hackers behind Emotet — one of the longest-tenured and most prolific malware variants dating back to 2014 — have been…

Nation-state Hackers Target Journalists with Goldbackdoor Malware

A campaign by APT37 used a sophisticated malware to steal information about sources , which appears to be a successor to Bluelight. Sophisticated hackers believed to be tied to the…

Cyber Reporting: New Legislation Impacts US Banks

As we all learned, cyberattacks on any type of organization can have serious consequences. Cyber incidents that impact computer systems and the theft of personal, financial, or other confidential information…

The White House wants more powers to crack down on rogue drones

The White House has laid out its plans to give more authorities the power to respond to nefarious drone activity. The administration says while drones – or unmanned aircraft systems…

And the Winner Is… You: How to Apply for Industry Awards to Boost Your Business

One of the most overlooked ways to help your business is to apply for—and hopefully win—awards presented by your partners, community or industry. It’s a great marketing tactic that can…

Inside a ransomware incident: How a single mistake left a door open for attackers

A security vulnerability that was left unpatched for three years allowed a notorious cyber-criminal gang to breach a network and plant ransomware.  The BlackCat ransomware attack against the undisclosed organisation took…

Security Teams Should Be Addressing Quantum Cyber-Threats Now

Organizations should move toward post-quantum cryptography now to counter upcoming quantum cyber-threats