Malware

A tenth of security alerts that should be taken seriously are ignored: John Maynard, Cisco

From evolving threats to DNS attacks and IoT security, John Maynard, Global Security Officer at Cisco brings to light present-day security challenges the enterprise needs to brace up to.

Former TransUnion CIBIL security leader Shiju Rawther joins India Infoline

The former head of IT infra and security operations at TransUnion CIBIL, Shiju Rawther has now joined financial services major, India Infoline as Executive VP-IT.

Cyber criminals increasingly favouring 'low and slow' stealth attacks

A "low and slow" approach to financially driven cyber attacks has overtaken ransomware as the chief attack vector for criminals seeking to extort money by stealth using crypto mining-based malware, according to research by British cybersecurity upstart Darktrace.

K7 Computing appoints K Purushothaman as its new CEO

Purushothaman joins from NASSCOM, where he served as Senior Director for over a decade. 

Email remains one of the most popular threat vectors: Report

Cloud App Security report reveals, email remains one of the most popular threat vectors. In total, the solution detected and blocked nearly 9 million high-risk email threats in 2018.

 

Former Paytm security leader Aditya Khullar joins OYO Rooms as Head-Cybersecurity

After a stellar stint in spearheading security at Paytm, Aditya Khullar joins OYO Rooms as its head of cybersecurity.

Hackers use Slack to hide malware communications

A watering hole attack used Slack for its command-and-control communications to avoid network and endpoint detection.

What is cryptojacking and how does it work?

'Cryptojacking' is a term used to describe the action of secretly using a computer to mine cryptocurrency.

Malicious URLs now rampant: Study

Malicious URLs are now rampant problem according to a study which found they are contained in an average of one in every 61 emails.

What is shadow IoT? How to mitigate the risk

When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.

What is Mimikatz? And how to defend against this password stealing tool

Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets.

Cyber and physical convergence creates new attack opportunities for cybercriminals

Access to these devices could enable cybercriminals to snoop on private interactions, enact malicious onsite activities, or gain an entry point into cyber systems.