intgr8r

Raspberry Robin worm used as ransomware prelude

Posted: October 31, 2022 by Pieter Arntz Raspberry Robin aka Worm. RaspberyRobin  started out as an annoying, yet relatively low-profile threat that was often installed via USB drive. First spotted in September 2021, it was typically introduced into a network through infected removable drives, often USB devices. Now the worm has been found to be the foothold for more serious threats

Raspberry Robin worm used as ransomware prelude Read More »

LinkedIn introduces new security features to combat fake accounts

Posted: November 1, 2022 by Malwarebytes Labs LinkedIn knows it has a problem with bots and fake accounts, and has acknowledged this on more than one occasion. For years, it has been aware of spam, fake job offers, phishing, fraudulent investments, and (at times) malware, and has been trying to combat those issues. In 2018, LinkedIn rolled out a way to automatically

LinkedIn introduces new security features to combat fake accounts Read More »

Protecting Your Business-Critical Data From Insider Threats

Although today’s technology-driven era has made information sharing and data access very efficient, it has brought forth a new set of challenges. One of the primary challenges businesses face is the rising threat to data security. However, the threat to business data does not always come from external actors. Worryingly, the greatest threat to business-critical

Protecting Your Business-Critical Data From Insider Threats Read More »

4 Employee Cyberthreat Traits

To succeed in today’s modern competitive business landscape, you need to understand the strengths and weaknesses of your employees. This will equip you to identify areas where employees may need further training, including cybersecurity awareness. Are you sure that your employees can resist threats and prevent cyberattacks? Certain employee traits can indicate a lack of

4 Employee Cyberthreat Traits Read More »

Fake Proof-of-Concepts used to lure security professionals

Posted: October 27, 2022 by Pieter Arntz Researchers from the Leiden University published a paper detailing how cybercriminals are using fake Proof-of-Concepts (PoCs) to install malware on researchers’ systems. The researchers found these fake PoCs on a platform where security professionals would usually expect to find them—the public code repository GitHub. Use of PoCs There is a big difference between

Fake Proof-of-Concepts used to lure security professionals Read More »

Ransomware Equals a Data Breach

From a data regulator’s perspective, it is the responsibility of your business to keep data safe from cyberthreats, inform clients about a breach within a stipulated period and provide necessary documentation as proof of your efforts. Although different regulations have laid down distinct mandates for breach notifications, the principle remains intact. While there is an

Ransomware Equals a Data Breach Read More »

What is ransomware-as-a-service and how is it evolving?

Posted: October 27, 2022 by Bill Cozens Ransomware attacks are becoming more frequent and costlier—breaches caused by ransomware grew 41 percent in the last year, the average cost of a destructive attack rising to $5.12 milllion. What’s more, a good chunk of the cyber criminals doing these attacks operate on a ransomware-as-a-service (RaaS) model. RaaS is not much different, in theory,

What is ransomware-as-a-service and how is it evolving? Read More »

Point-of-sale malware used to steal 167,000 credit cards

Posted: October 26, 2022 by Pieter Arntz In the 19 months between February 2021 and September 2022, two point-of-sale (POS) malware operators have stolen more than 167,000 payment records, mainly from the US, according to researchers at Group-IB. The researchers were able to retrieve information about infected machines and compromised credit cards by analyzing a command and control (C2)

Point-of-sale malware used to steal 167,000 credit cards Read More »