Here’s 5 of the world’s riskiest connected devices

Forescout’s research team analyzed 19 million connected devices deployed across five different industries, to find the riskiest device groups: smart buildings, medical devices, networking equipment, and IP cameras, VoIP, and video conferencing systems. Using the dataset and scoring methodology, where the risk of a device is calculated on its configuration, function, and behavior, the five […]

Continue Reading

Why paying the ransom is a mistake

New research from Databarracks reveals 44% of organizations that suffered a ransomware attack, paid the ransom. 34% recovered from backups, while 22% used ransomware decryption tools. The findings come from the Databarracks 2022 Data Health Check. This Help Net Security video explains how organizations are handling the cyber crisis and how various-sized businesses fared. The […]

Continue Reading

OnionPoison: infected Tor Browser installer distributed through popular YouTube channel

While performing regular threat hunting activities, we identified multiple downloads of previously unclustered malicious Tor Browser installers. According to our telemetry, all the victims targeted by these installers are located in China. As the Tor Browser website is blocked in China, individuals from this country often resort to downloading Tor from third-party websites. In our […]

Continue Reading

Cloud security trends: What makes cloud infrastructure vulnerable to threats?

In this Help Net Security video, Chris Caridi, Strategic Cyber Threat Analyst at IBM X-Force, talks about the findings of the latest IBM Security X-Force Cloud Security Threat Landscape Report. The X-Force report pulls data from IBM’s threat visibility, including X-Force Threat Intelligence data, hundreds of penetration tests, incident response engagements, and data provided by […]

Continue Reading

Linux variant of the SideWalk backdoor discovered

ESET researchers have discovered a Linux variant of the SideWalk backdoor, one of the multiple custom implants used by the SparklingGoblin APT group. Commands with different or missing implementation in the Linux version of SideWalk Targeting a Hong Kong university This variant was first deployed against a Hong Kong university in February 2021 — the […]

Continue Reading

CIOs find it most difficult to solve cybersecurity challenges

A global research study from Lenovo reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite, as well as removing barriers to business growth. Today, technology is the nervous system that connects corporate strategy, finance, innovation, operations, and talent. CIOs are increasingly tasked with connecting […]

Continue Reading

Ransomware updates & 1-day exploits

Introduction In our crimeware reporting service, we analyze the latest crime-related trends we come across. Last month, we again posted a lot on ransomware, but we also covered other subjects, such as 1-day exploits. In this blogpost, we provide excerpts from these reports. For questions or more information about our crimeware reporting service, please contact […]

Continue Reading