article thumbnail

Google Drive accounted for the most malware downloads from cloud storage sites in 2021

Tech Republic Security

Google took over the top spot for malicious downloads from Microsoft OneDrive as attackers created free accounts, uploaded malware and shared documents with unsuspecting users, says Netskope.

Malware 217
article thumbnail

New FurBall Android Malware Used to Spy on Iranian Citizens

SecureWorld News

A new version of the Android malware "FurBall" has been discovered to be used by the threat actor(s) known as Domestic Kitten in a campaign targeting Iranian citizens in a mobile surveillance operation. Though it has the Google Play logo, the app is not available in the Google Play store and downloads directly from Domestic Kitten's server.

Malware 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Endpoint security and the rise of Managed Device Services

CIO Business Intelligence

Despite growing interest in “as a service” consumption models for everything from infrastructure to storage, most enterprises have continued to procure, maintain, and manage endpoint devices in-house. After all, who is better able to configure and manage a device than its manufacturer?

article thumbnail

Microsoft Names New Cyber Threat Actor: Nobelium

SecureWorld News

Microsoft has said they observed the threat actor using both backdoor and other malware implants to establish sustained access to affected networks. Researchers attributed the Sunburst backdoor, Teardrop malware, and any related components of the SolarWinds attacks to Nobelium. The new Nobelium malware. GoldMax malware.

article thumbnail

Hacking News Roundup: Even 'Fast Company' Isn't Safe

SecureWorld News

This summer has seen an increase in attackers' use of the Deadbolt ransomware variant, which affects network-attached storage (NAS) devices. This report dives into how this growing tactic works, including how NAS boxes are vulnerable due to their "plug-and-play" nature for network attached storage. Deadbolt ransomware variant.

Company 74
article thumbnail

IT Issues that Need Cleaning Up: Herzog’s Dirty Dozen

CIO Business Intelligence

They are the challenges, gaps, misconceptions, and problems that keep CxOs, storage administrators, and other IT leaders up at night, worried that they don’t know what they don’t know. Disconnect between cybersecurity and enterprise storage. This entails evaluating the relationship between cybersecurity, storage, and cyber resilience.

Storage 97
article thumbnail

IT Issues that Need Cleaning Up: Herzog’s Dirty Dozen

CIO Business Intelligence

They are the challenges, gaps, misconceptions, and problems that keep CxOs, storage administrators, and other IT leaders up at night, worried that they don’t know what they don’t know. Disconnect between cybersecurity and enterprise storage. This entails evaluating the relationship between cybersecurity, storage, and cyber resilience.

Storage 94