The Latest in IT Security

1

A recently discovered wave of malware attacks has been spotted using a variety of tactics to enslave susceptible machines with easy-to-guess administrative credentials to co-opt them into a network with the goal of illegally mining cryptocurrency. “The malware’s primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they’ve […]

Read more ...

1

Spyware developed by the company NSO Group is back in the news today after Apple released an emergency fix for iPhones, iPads, Macs, and Apple Watches. The update fixes a vulnerability silently exploited by software called Pegasus, which is often used in high-level surveillance campaigns by governments. Zero-day Pegasus spyware is typically installed on victims’ […]

Read more ...

1

Formbook, an “infostealer” malware that can harvest web browser credentials, take screenshots, log keystrokes and download and run executive files, is now the most prevalent threat around today, a new report has claimed. This is according to the Global Threat Index for August 2021research paper published by Check Point Research, which found Formbook affected 4.5% […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments