article thumbnail

Government Agencies Discover New Chinese Malware Strain

SecureWorld News

CISA reports on Chinese malware strain. And it's a malware strain used specifically by the Chinese government. A recent CISA Malware Analysis Report (with contributions from the FBI and DoD), outlines this new malware variant. Check out the complete report here. It's called Taidoor.

Malware 53
article thumbnail

Microsoft Reports on Techniques Used by SolarWinds Hackers

SecureWorld News

Microsoft has released a report that details the techniques used by the SolarWinds threat actor. The attack included the use of malware delivery methods, anti-forensic behavior, and operational security (OPSEC). Microsoft's SolarWinds report. Lateral movement activities were never executed without preparation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

2015 Cyberthreat Defense Report Reveals Cyberattacks Rising and Confidence Sinking

CTOvision

The more fact-based reports based on forensics are much more important (this brings to mind what John Oliver said about opinions vs facts ). Phishing, malware, and zero-days top of mind. Most respondents signaled they expect to be breached in the next 12 months. Fed up with inadequate endpoint defenses.

Report 150
article thumbnail

Ransomware Evolves: Entire Hospital Including Emergency Rooms Disrupted

CTOvision

For more details on the attack see this NBC Los Angles Report. The typical organization already has firewalls, anti virus solutions, encrypted data solutions, data backups, network monitoring and security information management tools to hold data on how all that is working. But still the malware gets in. The malware gets in.

Malware 150
article thumbnail

The Small Business Guide to Information Security

Galido

As a matter of fact, it was reported that each cyber attack costs small business owners $200,000 on average, which is more than enough to put many out of business. One of the best and first things that you should do to ensure information security in your business is to install a firewall. Have the Talent in House, or Develop it.

article thumbnail

Are Bad Bots Unleashing Havoc in the Digital Realm?

SecureWorld News

According to a recent report , bots accounted for a staggering 47.4% Out of the 13 countries examined in the report, seven exhibited levels of bad bot traffic, surpassing the global average of 30.2%. Spreading malware: Bots play a role in distributing malware, such as viruses, trojans, and ransomware. Stats on bots 1.

Malware 68
article thumbnail

‘Extremely bad’ vulnerability found in widely used logging system

The Verge

If exploited, the vulnerability allows remote code execution on vulnerable servers, giving an attacker the ability to import malware that would completely compromise machines. The vulnerability is found in log4j, an open-source logging library used by apps and services across the internet.

System 142