The Latest in IT Security

Posts Tagged ‘access-as-a-service’

Okay, thanks for the warning. What will be the topic?The criminal gang behind Gootkit malware resurfaced through a campaign aimed at the Australian healthcare industry. Some version of Gootkit has existed since 2014, when researchers first spotted it functioning as a banking Trojan. More recently, its operators appear to offer access as a service, with […]

Read more ...

The Raspberry Robin worm is becoming an access-as-a-service malware for deploying other payloads, including IcedID, Bumblebee, TrueBot (aka Silence), and Clop ransomware. It is “part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread,” the Microsoft Security Threat Intelligence Center (MSTIC) […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments