The Latest in IT Security

Posts Tagged ‘Credentials’

Organizations should be on the alert for adversaries attempting to breach their computer systems by using little or no malware in their attacks, warns Dell SecureWorks’ Counter Threat Unit (CTU) senior researcher Phil Burdette. According to Burdette, cyber criminals are using the target company’s own system credentials and legitimate software administration tools to move freely […]

Read more ...

We have detected a phishing campaign targeting Android developers who are publishing their creations in Google Play, Android’s official app store. The form field in the email comes from “Play Developer Support”, with the subject “Update your Account Information”, as you can see in the following screenshot. Phishing attacks are designed to steal credentials and […]

Read more ...

Websense revealed a high degree of specialization among criminals attacking financial services, a huge investment in the lure attack phase and the specific and anomalous attacks pointed at global targets dealing in finance. By analyzing data on attack patterns unique to specific industries, Websense researchers gained new insight into attack patterns, structures and tendencies against […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments