Over 90% Attacks on Cloud Servers Attempt Cryptomining, Study Reveals

Over 90% Attacks on Cloud Servers Attempt Cryptomining, Study Reveals - Cybersecurity news - Trends, Reports, Analysis
A cybercriminal group has been discovered launching brute-force attacks on thousands of MSSQL servers to deploy a cryptomining malware dubbed MrbMiner in compromised systems.

Threats Continue Plaguing Oil & Gas Sector: Report

Threats Continue Plaguing Oil & Gas Sector: Report - Cybersecurity news - Trends, Reports, Analysis
A Kaspersky report found that during the first half of 2020 the percentage of systems attacked in the oil and gas and building automation industries increased as compared to H2 2019.

State-Sponsored Hacking Groups Increasingly Use Cloud & Open Source Infrastructure

Cyber espionage groups increasingly use cloud-based services and open source tools to create their infrastructure for gathering data and cyberattacks, attempting to hide their activities.

The lifecycle of a eureka moment in cybersecurity

The lifecycle of a good cybersecurity idea may start with tech, but it requires a powerful infusion of foresight and listening to make it through investor and customer pipelines.

Microsoft looks to expose espionage groups taking aim at NGOs, US politics

Of the thousands of notifications Microsoft made to customers about state-linked hacking activity from mid-2019 to mid-2020, NGOs accounted for 32% of alerts, the company said in a recent report.

DDoS attacks are getting more powerful as attackers change tactics

Researchers have observed a surge in Distributed Denial of Service (DDoS) attacks throughout the course of this year, and the attacks are getting more powerful and more disruptive.

FBI Warns: Credential Stuffing Attacks on the Rise

The FBI Private Industry Notification says greater use of botnets enables cybercriminals and fraudsters to quickly hit many targets in search of finding credentials that work.

Cybersecurity is a top priority for digital transformation

Cybersecurity is the number one technology priority for planned digital transformation projects as businesses adapt to a surge in remote working as a result of the COVID-19 pandemic.

MFA-Minded Attackers Continue to Figure Out Workarounds

As online users become increasingly aware of and use multifactor authentication (MFA), attackers are devising new ways to circumvent the technology — and often with great success.

A Fifth of Privileged Users Don’t Need Elevate Access

Over a third of government and enterprise users have been given privileged access despite not needing it, potentially exposing their organization to greater cyber-risk, according to Forcepoint.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags