Sign up for our weekly newsletter!
REGISTER NOW
Jeffrey Burt
Latest Content
Page 1 / 2   >   >>
Vulnerability Puts Millions of Fortnite Players at Risk, Check Point Finds
Jeffrey Burt  
1/18/2019   3 comments
Epic Games, the developer of Fortnite, fixed vulnerabilities in its web infrastructure that researchers said exposed the sensitive information of users of the wildly popular online game.
ServHelper & FlawedGrace Malware Highlight Shift in Cyber Attacks
Jeffrey Burt  
1/11/2019   Post a comment
The ServHelper and FlawedGrace malware developed by threat group TA505 exemplify the move away from smash-and-grab ransomware toward more stealthy, longer campaigns, according to a recent analysis by Proofpoint.
Spectre, Meltdown Vulnerabilities Will Haunt Industry for Years
Jeffrey Burt  
1/8/2019   2 comments
Chip makers such as Intel have released patches and fixes to mitigate Spectre and Meltdown issues, but the problem won't be solved until they come out with new architectures, which is two to three years away.
Healthcare Industry Still in Ransomware Crosshairs
Jeffrey Burt  
12/27/2018   16 comments
A report by Kaspersky researchers has found that healthcare organizations in the US and Canada are still at heightened risk of ransomware attacks.
Cloud Backup: How It Can Protect Against Ransomware
Jeffrey Burt  
12/20/2018   1 comment
For enterprises anxious to avoid being extorted by attackers using ransomware, backing up data to the cloud is an option to consider, though it's not the answer for everyone.
Many Enterprises Still Blind to Security Risk, Study Finds
Jeffrey Burt  
12/19/2018   1 comment
Even as organizations continue to get hit with cyber attacks, they're struggling to accurately measure the costs of such events to their operations, a report by Tenable and the Ponemon Institute found.
IoT Botnets Shifting to Exploit Vulnerabilities
Jeffrey Burt  
12/13/2018   1 comment
A report from NetScout's ASERT Team finds that IoT devices are vulnerable to exploits for long periods of time and can be attacked within minutes after coming online.
M2M Protocols Expose IoT Data, Trend Micro Finds
Jeffrey Burt  
12/11/2018   Post a comment
The MQTT and CoAP protocols that are crucial to IoT and IIoT operations have significant vulnerabilities that puts devices at risk, according to analysis from Trend Micro.
APTs in 2018: A Mix of Old & New
Jeffrey Burt  
12/10/2018   Post a comment
Established threat groups and new players alike made for an active APTs scene this year, according to researchers with Kaspersky Lab.
Cybercriminal Underground Will Continue to Consolidate in 2019
Jeffrey Burt  
12/3/2018   Post a comment
There will be fewer malware-as-a-service families, but they will be bigger, stronger and more sophisticated, according to a report from McAfee.
Carbon Black: Cyber Attacks Could Jump 60% During Holidays
Jeffrey Burt  
11/26/2018   20 comments
Spear-phishing campaigns are the most common form of attack as shoppers go to the stores and online and employees hit the road, according to a survey from Carbon Black.
IoT Security Problems Can Cost Enterprises Millions
Jeffrey Burt  
11/20/2018   Post a comment
A survey by DigiCert finds that the IoT is a priority for most companies, but many enterprises struggle when it comes to security and privacy. This can translate into firms losing millions.
Security Concerns Increasing as BYOD Programs Continue to Grow
Jeffrey Burt  
11/19/2018   1 comment
Businesses are expanding their BYOD programs to include partners, customers and others, but most are behind in securing their mobile environments, according to a Bitglass survey.
On Eve of 2018 Midterm Elections, All Eyes Still on Cybersecurity
Jeffrey Burt  
11/5/2018   2 comments
Netscout and McAfee executives talk about the myriad challenges facing state and county election officials as voting for the 2018 midterm elections is about to get underway.
Kaspersky: Most CISOs Say Cyber Attacks Are Inevitable
Jeffrey Burt  
10/30/2018   3 comments
The Kaspersky Lab report says that while the relationship between executives and CISOs is improving, there continues to be a disconnect around such issues as budgets and the risk of threats.
iPhones Increasingly Vulnerable to Coinhive Cryptomining Malware
Jeffrey Burt  
10/24/2018   Post a comment
In their most recent Global Threat Index, Check Point researchers found a 400% increase in Coinhive attacks against iPhones by bad actors using the popular cryptomining malware.
McAfee: Seasalt Malware Raises Its Head Again
Jeffrey Burt  
10/19/2018   Post a comment
Code from the Seasalt malware that was last seen in 2010 has been found in new campaigns in North Korea and North America, according to McAfee.
Gallmaker Attackers Living Off the Land, Symantec Finds
Jeffrey Burt  
10/15/2018   Post a comment
Gallmaker, a new state-sponsored threat group, eschews custom malware for legitimate hacking tools and techniques to run under the radar while attacking government and military organizations in eastern Europe and the Middle East, according to recent research from Symantec.
DanaBot Banking Trojan Is Now Finding Its Way to the US
Jeffrey Burt  
10/8/2018   Post a comment
The DanaBot Trojan first targeting organizations in Australia earlier this year has expanded into Europe and now is aiming at US, according to Proofpoint.
USB Devices Still a Threat to Businesses, Kaspersky Finds
Jeffrey Burt  
10/1/2018   Post a comment
The use of removable storage media to deliver malware is declining, but threat actors are putting coin miners into USB devices and targeting emerging areas, a new study by Kaspersky finds.
Verizon Study Finds PCI DSS Compliance Falls Worldwide
Jeffrey Burt  
9/27/2018   8 comments
Verizon's report says that fewer businesses are complying with the PCI DSS payment standard despite the rising threat of security breaches and consumer data theft.
Xbash Malware: Dangerous Mix of Threats
Jeffrey Burt  
9/21/2018   Post a comment
The Xbash malware includes ransomware and cryptomining functions as well as botnet and self-propagation capabilities and will delete Linux databases.
Ransomware Developers Embrace Politics, Targeting Obama, Trump & Merkel
Jeffrey Burt  
9/20/2018   1 comment
Recent malware campaigns have used names such as Barak Obama, Angela Merkel and Donald Trump to entice unsuspecting users to download the ransomware, McAfee researchers have found.
PyLocky Ransomware Can Get Around Machine Learning Solutions
Jeffrey Burt  
9/18/2018   Post a comment
The PyLocky ransomware, detected by Trend Micro, puts a focus on the ongoing machine learning race between cybersecurity experts and bad actors.
Iran Targeting ISIS Supporters, Kurds With Spyware
Jeffrey Burt  
9/14/2018   Post a comment
Check Point researchers found that victims of Iran's campaign were enticed to download mobile apps that were packed with spyware.
Cobalt Group Returns With Downloader Malware
Jeffrey Burt  
9/13/2018   Post a comment
Proofpoint found new campaigns by the notorious cybercrime gang using its CobInt modular downloader.
Trend Micro: Cryptomining, Data Breaches Highlight Busy 1H 2018
Jeffrey Burt  
9/7/2018   Post a comment
The rise of design flaws in processors from Intel and other chip-makers and the slowing down of ransomware were key trends in cybersecurity in the first six months of the year.
Android Spyware BusyGasper: Small With Unusual Capabilities
Jeffrey Burt  
9/5/2018   4 comments
Kaspersky researchers said the malware is not sophisticated, but it comes packed with a broad array of interesting features and capabilities.
Kaspersky: Lazarus Takes Aim at macOS in Cryptocurrency Campaign
Jeffrey Burt  
8/28/2018   4 comments
Kaspersky researchers said users of Apple and Linux systems should see the AppleJesus campaign as a warning not to get lax in their cybersecurity efforts.
Vulnerable Web Apps Top Threat to Enterprises
Jeffrey Burt  
8/22/2018   2 comments
A report by Kaspersky researchers found that 73% of successful network perimeter breaches in 2017 were committed via web apps, while inside threats continue to put companies at risk.
Congressional Campaign Websites Vulnerable to Attack, Say Researchers
Jeffrey Burt  
8/17/2018   1 comment
Researchers presented a study at DEF CON that showed that a third of congressional candidates' websites are vulnerable to attack, adding to threats already seen by some politicians.
Check Point: Fax Machines, Networks Vulnerable to Attack
Jeffrey Burt  
8/17/2018   12 comments
Researchers for the cybersecurity company found a way to exploit vulnerabilities in the fax system of an HP OfficeJet inkjet all-in-one printer to gain access to all systems on a network.
Researchers Show That Code Reuse Links Various North Korean Malware Groups
Jeffrey Burt  
8/10/2018   Post a comment
Analysts from McAfee and Intezer announced that by reviewing samples, they have found ties between campaigns and threat groups linked to North Korea.
Banking Trojans on the Rise in Q2, Kaspersky Report Finds
Jeffrey Burt  
8/8/2018   1 comment
Kaspersky Labs saw a record number of new installation packages in the second quarter of this year, with modification to help the malware avoid security solutions.
Spam at 40: Still a Robust Security Threat in Middle Age
Jeffrey Burt  
8/6/2018   15 comments
Four decades after the first such email was sent, attackers are still using spam to deliver their malware.
Kaspersky: Spear-Phishing Attacks Target 400 Industrial Companies
Jeffrey Burt  
8/3/2018   6 comments
The emails in the spear-phishing campaign, which has been going on for months, are disguised as legitimate finance documents that include profiles of the organizations being attacked, according to Kaspersky Labs.
AZORult Downloader Adds Cryptomining, Ransomware Capabilities
Jeffrey Burt  
8/1/2018   Post a comment
Proofpoint researchers said the latest version of the AZORult information stealer and downloader makes it a larger threat and noted that the group behind it is now advertising its cryptomining and ransomware capabilities.
PowerGhost Cryptomining Malware Targets Corporate Networks
Jeffrey Burt  
7/31/2018   1 comment
Kaspersky Lab researchers said the malware uses fileless techniques to make it harder to detect and the Eternal Blue exploit to spread to systems across the networks.
Kronos Returns as Banking Trojan Attacks Ramp Up
Jeffrey Burt  
7/27/2018   1 comment
Proofpoint researchers have seen a new version of the four-year-old Kronos emerge in campaigns in Europe and Japan. The report also finds it may be rebranded as 'Osiris.'
Kaspersky: There's No Such Thing as a Free Gift Card Code
Jeffrey Burt  
7/24/2018   Post a comment
Kaspersky Labs is warning that bad actors are using a scheme offering free gift card codes from Amazon, Google, eBay and others to separate consumers from their personal data and money.
Attackers Increasingly Turning Attention to the Cloud
Jeffrey Burt  
7/13/2018   10 comments
In the first half of 2018, Check Point researchers saw threat actors turning more of their attention to the cloud to steal data, as well as to grab compute power for cryptomining efforts.
IBM: Hidden Costs Drive Up Financial Hit of Mega Breaches to $350M
Jeffrey Burt  
7/12/2018   1 comment
For companies that have 50 million records compromised, lost business and reputation, as well as the employee time spent in recovery work, can put the overall cost at $350 million.
Kaspersky: Asia the Focus of APT Operations in Q2
Jeffrey Burt  
7/12/2018   Post a comment
In their second quarter report, Kaspersky researchers also noted the return of various well-known bad actors and the threats facing networking hardware devices.
HNS IoT Botnet Evolves, Goes Cross-Platform
Jeffrey Burt  
7/10/2018   2 comments
The Hide 'N Seek malware had previously targeted devices such as home routers and DVRs, but now the botnet is including Apache CouchDB and OrientDB in its expanding list of targets.
Cisco: GDPR Is About More Than Compliance
Jeffrey Burt  
7/10/2018   Post a comment
Cisco's top privacy official says that the EU's new privacy regulations – GDPR – gives forward-thinking companies an opportunity to excel by building new data management and privacy models.
How Quantum Physics Will Protect Against Quantum-Busting Encryption
Jeffrey Burt  
7/5/2018   2 comments
The CEO of the startup Quantum Xchange envisions a nationwide dark fiber quantum network that protects encrypted data in transit with an on-demand Quantum Key Distribution service.
Mobile Malware Group Hits Google Play a Third Time
Jeffrey Burt  
6/29/2018   17 comments
McAfee researchers found that AsiaHitGroup earlier this year again targeted Android device users in Asia with a bulked-up Sonvpay campaign complete with silent push notifications.
McAfee: Cybercriminals Improving Techniques as Cryptomining Explodes
Jeffrey Burt  
6/28/2018   19 comments
Cybercrime campaigns during the quarter showed that bad actors are improving upon the threats from last year, according to McAfee. Meanwhile, cryptomining schemes continue to skyrocket.
IBM Spinout Senzing Fights Fraud, Insider Threats With AI
Jeffrey Burt  
6/26/2018   11 comments
Senzing, a rare IBM spinout, enables organizations to quickly and easily run through thousands of corporate records to find bad actors that represent a threat to their businesses.
Olympic Destroyer Returns With Attacks in Europe
Jeffrey Burt  
6/20/2018   2 comments
Kaspersky Labs researchers believe the hackers behind the Olympic Destroyer worm that wreaked havoc at the Winter Olympics are now focusing on organizations that research chemical and biological threats in Europe.
Page 1 / 2   >   >>




Latest Articles
What application security must address to stay ahead of the attackers.
The latest update from the OpenSSH developers encrypts private keys before storing them into the system memory, which will protect the keys against almost all types of side-channel attacks.
SafeBreach found that one library of software which was used to construct Dell's SupportAssist can be tricked into loading DLL files that it really shouldn't.
Advances in both QC and QC methods will see to that.
Certificate Authorities are continually getting requests from threat actors who want certificates that they aren't entitled to so that their criminal schemes may be furthered.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with