The Latest in IT Security

minus
  • img
  • img
  • img
plus

Categories

MONDAY, MAY 21, 2018

Featured

Archives

Latest Comments

Social Networks

In recent years the global payment landscape has undergone a seachange. Gone are the days where financial transactions impacted only core and branch banking. In the last few years, fintechs have opened previously unimaginable avenues for individuals and businesses alike. Fueled by the mobile revolution, the financial vocabulary has grown to include tablet banking, mobile […]

Read more ...

Cybercriminals have been using a new method to ensure that the URLs included in their phishing emails bypass the Safe Links security feature in Office 365, cloud security company Avanan revealed on Tuesday. Safe Links, offered as part of Microsoft’s Office 365 Advanced Threat Protection (ATP) solution, is designed to protect organizations against malicious links […]

Read more ...

The Process Doppelgänging technique was first presented in December 2017 at the BlackHat conference. Since the presentation several threat actors have started using this sophisticated technique in an attempt to bypass modern security solutions. In April 2018, we spotted the first ransomware employing this bypass technique – SynAck ransomware. It should be noted that SynAck […]

Read more ...

As Senate Bill 315 sits on Georgia Governor Nathan Deal’s desk, awaiting either his signature of approval or a veto, a group of vigilante hackers going by SB315 have reportedly been attacking Georgia sites and threatening retaliation if the bill becomes law. It’s unclear why the group believes that a hacking spree will help convince […]

Read more ...