From the editors of our sister publication Computerworld, this enterprise buyer’s guide helps IT staff understand what the various unified endpoint management (UEM) platforms can do for their organizations and how to choose the right solution. Go to Source Author:
Author Archives: Onsite Computing, Inc.
Russian-speaking threat actors accounted for at least 69% of all crypto proceeds linked to ransomware throughout the previous year, exceeding $500,000,000. […] Go to Source Author: Bill Toulas
Outlining the wider organization’s proactive role in fortifying the security program allows the security team to focus on the most pressing issues that only they can solve. Go to Source Author: Lenny Zeltser
Intel works closely with academic researchers on hardware flaws and coordinates efforts with other vendors to roll out fixes for emerging vulnerabilities. That wasn’t always the case. Go to Source Author: Agam Shah, Contributing Writer
A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking malware-as-a-service (MaaS) offerings to the next level. Singaporean cybersecurity company Group-IB, which has been tracking the e-crime actor since January 2023, described the crimeware solution as a “sophisticated AI-powered phishing-as-a-service platform” Go to Source Author:
“Peace is the virtue of civilization. War is its crime. Yet it is often in the furnace of war that the sharpest tools of peace are forged.” – Victor Hugo. In 1971, an unsettling message started appearing on several computers that comprised ARPANET, the precursor to what we now know as the Internet. The message, […]
Mimecast’s acquisition of Code42 helps the company move into insider risk management, joining key rival Proofpoint and others in the space. Go to Source Author: Jeffrey Schwartz, Contributing Writer
Empirical evidence shows that global cyber threats have increased twofold in the past few years. The IMF study, “Rising Cyber Threats Pose Serious Concerns for Financial Stability” (the title itself is ominous), outlined $12 billion dollars of losses from 20,000 malicious cyber incidents against the financial sector alone in the past 20 years. Unfortunately, this […]
The U.S. Department of Justice (DoJ) on Thursday unsealed an indictment against a North Korean military intelligence operative for allegedly carrying out ransomware attacks against healthcare facilities in the country and funneling the payments to orchestrate additional intrusions into defense, technology, and government entities across the world. “Rim Jong Hyok and his co-conspirators deployed Go […]
Cybersecurity researchers are sounding the alarm over an ongoing campaign that’s leveraging internet-exposed Selenium Grid services for illicit cryptocurrency mining. Cloud security Wiz is tracking the activity under the name SeleniumGreed. The campaign, which is targeting older versions of Selenium (3.141.59 and prior), is believed to be underway since at least April 2023. “Unbeknownst to […]
