The Latest in IT Security

Posts Tagged ‘data exfiltration’

Some malware families targeting Point-of-Sale (POS) systems did not take a vacation this Thanksgiving, but instead were hard at work stealing payment card data, Proofpoint security researchers say. Two PoS threats, ZeusPoS and NewPoSthings, showed a three to four-fold increase in data exfiltration traffic when compared to normal operation periods, the security researchers say. While […]

Read more ...

For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, using radio frequencies (“AirHopper”); using heat (“BitWhisper”), using rogue software (“GSMem”) that modulates and transmits electromagnetic signals at cellular frequencies. The latest version of the data-exfiltration attack against […]

Read more ...

As more and more organizations adopt cloud platforms, new shadow IT risk vectors are coming into play in the form of connected third-party apps, according to CloudLock CyberLab’s analysis across 10 million users, 1 billion files, and nearly 160,000 unique applications.

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments