Trends 2017: Fewer vulnerabilities are being reported, but are we any safer?

The rapid global spread of technology, and the increasingly numerous types of interconnected devices routinely used, have greatly increased the number of attack vectors available to cybercriminals. This is why the exploitation of vulnerabilities is still one of our major concerns when it comes to corporate security incidents around the globe. For more detail, check out … More Trends 2017: Fewer vulnerabilities are being reported, but are we any safer?

OneLogin data breach may have compromised encrypted information

OneLogin  has admitted that it cannot guarantee the security of encrypted data compromised by a cybercriminal on Wednesday (May 31st). The firm has confirmed that a review is currently underway to investigate the data breach, which affected its “US data region”. Unauthorised access has since been blocked and the incident has been reported to the … More OneLogin data breach may have compromised encrypted information

Turla’s watering hole campaign: an updated Firefox Extension abusing Instagram

Some of the tactics used in APT attacks die hard. A good example is provided by Turla’s watering hole campaigns. This group, which has been targeting governments, government officials and diplomats for years, is still using watering hole techniques to redirect potentially interesting victims to their C&C infrastructure. In fact, they have been using them … More Turla’s watering hole campaign: an updated Firefox Extension abusing Instagram

$8 trillion ‘to be lost to cybercrime in next 5 years’

Businesses are set lose $8 trillion to cybercrime over the course of the next five years, according to a new report. Juniper Research found that enterprises around the world are more at risk due to even greater levels of internet connectivity, as well as “inadequate enterprise wide security”. The paper, titled The Future of Cybercrime … More $8 trillion ‘to be lost to cybercrime in next 5 years’

ESET releases decryptor for AESNI ransomware variants, including XData

Releasing master keys for older ransomware variants has become somewhat of a trend these days. Shortly after the release of the updated Crysis decryptor, master keys for some of the variants of the AES-NI family were published – specifically Win32/Filecoder.AESNI.B and Win32/Filecoder.AESNI.C, also known as XData. Based on this, ESET experts have prepared an AES-NI … More ESET releases decryptor for AESNI ransomware variants, including XData