APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

Credit to Author: Vallabh Chole| Date: Tue, 28 May 2019 06:01:42 +0000

In today’s world data is everything, and to store and process this large amount of data, everyone started using computing devices. So, application server’s which are used for storing this precious data on computing devices include MYSQL, MongoDB, MSSQL, etc. But unfortunately, no one is conscious about its security. In…

Read more

This Valentine fall for true love not for fake online dating apps

Credit to Author: Sushmita Kalashikar| Date: Thu, 14 Feb 2019 12:36:04 +0000

Valentine Day is that special time of the year when people are busy celebrating the essence of love. However, on the darker side, it is also a time when cyber criminals are looking to cash on your hunt for the love of your life. So, just in case you are…

Read more

Anatova, A modular ransomware

Credit to Author: Shriram Munde| Date: Tue, 29 Jan 2019 06:09:49 +0000

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has discovered the first ransomware of 2019 — Anatova ransomware. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we…

Read more

GandCrab Ransomware along with Monero Miner and Spammer

Credit to Author: Prashant Tilekar| Date: Thu, 24 Jan 2019 11:54:00 +0000

Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common for ransomware to be paired with miner and spammer. This type…

Read more

Malspam email – Jack of all malware, master of none.

Credit to Author: Shriram Munde| Date: Mon, 21 Jan 2019 07:37:49 +0000

Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for the attackers to deliver the malware to targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are…

Read more

Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late

Credit to Author: Steven Carlini| Date: Wed, 16 Jan 2019 16:00:00 +0000

It’s been well publicized that Microsoft fends off more than 7 trillion cyberthreats per day, and allocates over $1 billion each year to cybersecurity for its cloud data centers. While… Read more »

The post Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late appeared first on Schneider Electric Blog.

Read more

Ransomware displaced by cryptojacking as the most trending cyberthreat but it is not dead yet

Credit to Author: Sushmita Kalashikar| Date: Wed, 09 Jan 2019 10:23:23 +0000

For those of you who have experienced the worst of Ransomware attacks in the form of WannaCry and Petya and believe that the worst is over; you never know what may await you on the other side of this New Year. While the recent threat analysis reports by Quick Heal…

Read more