Posts

Showing posts from August, 2022

June 2022: MaliBot, New Banking and Poses Dangerous to Mobile Banking Users

  According to the latest Global Threat Index, MaliBot is third on the list of most dangerous mobile malwares. After the May end takedown of FluBot, MaliBot emerged. MaliBot claims to be a cryptocurrency mining app under various names. To steal financial information, it targets mobile banking users. MaliBot is similar in nature to FluBot. It uses phishing SMS messages (smishing) to lure victims into clicking on malicious links that will redirect them onto a fake app. Emotet is still the most downloaded malware this month. After a significant increase in activity over the eighth place last month, Snake Keylogger now occupies third place. Snake Keylogger is primarily used to track keystrokes and send data to threat agents. Snake Keylogger was originally sent to us in PDF format in May. It has been sent to us via email as an attachment with Word attachments tagged as requests for quotations. Researchers also discovered a new version of Emote...

Why SMBs Need To Consider Cyber Insurance

  Cybersecurity threats are becoming more dangerous.   Ransomware attacks are increasing, with the frequency of these attacks more than doubling over the past few years . Cloud-based attacks continue catching insecure companies off guard.   It is not enough to just invest in security technology and hope that your company doesn't fall prey to an attack.   Organizations must be ready for what is inevitable, such as a data breach or security incident. SMBs are particularly at risk.   SMBs are more vulnerable to attacks than well-funded companies. Follina and log4j are just two examples of vulnerabilities that make them more at risk.   Hackers are aware that SMBs are prime targets, and they are now targeting them with attacks. SMBs can take advantage of cyber insurance to mitigate this cyber risk.   This is crucial for ensuring a healthy recovery after a cyberattack as it reduces many of the financial repercussions that can be associated with...

Security Priorities for 2022: What Small and Midsize Businesses Need to Know

  Despite all the news about cyber attacks and cyberattacks, 9/10 IT and security executives believe that their companies are failing to address cyber threats, as per the Foundry 2020 Security Priorities Study. However, there is some good news.   A lot of small businesses lack security expertise and turn to outsourcing companies to help.   In the year ahead, 21% of them plan to completely outsource their security requirements. But, before you do that, take a look at this: Many managed service providers (MSPs) are also lacking the expertise in security.   When faced with cutting-edge cyber-attacks, their strategies could be limited to setting up basic firewall rules and then deploying antivirus software, according to Gaidar Magdanurov, chief success officer at Acronis. However, having a stronger security posture is the expense of companies.   This can lead to holes and risk for both SMBs as well as their customers. "We typically see that few SMBs have a s...

What Will Machine Learning (ML) Tools Change the Cyber Threat Landscape?

  Artificial intelligence Artificial intelligence, which is AI for short isn't an entirely new phenomenon.   It has been around since the 1950s. However, nowadays, AI has gained momentum and is now more advanced than was believed to be and to the point where the fears of AI cyberwarfare have become an actuality. The term "traditional" cyberwarfare is the use of technology and the internet to harm or disrupt the country in question by using malware or denial-of service attacks or disinformation campaigns. AI cyberwarfare refers to usage in the use of AI or machine learning (ML) instruments to boost the effectiveness of these operations and make them more efficient. "At exactly the time the prerequisites for digital warfare were being created and the capabilities of automated information processing have seen a quantum leap.   AI is therefore in the middle of cyberwarfare due to its apparent potential and its intrinsically numerical nature." wrote academic rese...

How Quantum Computing Will Change Encryption Forever

  However, every now and then an emerging technology changes the way we do things, requiring urgent action, usually from both sides.   For instance, cloud computing has changed the way businesses deal with cybersecurity, a transition which many companies are exploring. Quantum computing has the capability to transform how we interact with computers and technology , providing us with a huge computing capacity.   But, if it's misused when it's misused this could mean quantum computing could also cause harm to our security.   When we're unprepared, companies are at risk like never before. Quantum computing is an important paradigm shift which we must address in the earliest possible time, before hackers can gain access to the technology. Quantum computing promises to be the future of computing Quantum computing was under development in the past few years and is based on the basis of quantum mechanics.   The traditional computing system has depended on the b...